Two Dumb Questions
Dag-Erling Smørgrav
des at des.no
Mon Sep 26 20:48:16 UTC 2016
RW <rwmaillists at googlemail.com> writes:
> There's a simple paint analogy here:
>
> https://en.wikipedia.org/wiki/Diffie–Hellman_key_exchange
>
> that illustrates how it's possible to exchange a shared secret without
> an eavesdropper knowing what it is. The shared secret can then be used
> for symmetric encryption using something like AES.
SSL / TLS didn't commonly use DH, much less *safe* DH, until fairly
recently, and DH alone is not very useful. You need either a shared
secret or trusted key pairs to authenticate either or both endpoints.
> Actual protocols use public key cryptography so it can be established
> that the exchange is end to end, and not broken into two separate
> exchanges.
Assuming you can trust the public key, which is what CAs are for, but
CAs can be hacked, deceived or coerced.
DES
--
Dag-Erling Smørgrav - des at des.no
More information about the freebsd-security
mailing list