Timeline for answer to Does public key cryptography provide any security advantages, or even just a different security model, over symmetric cryptography? by Ja1024
Current License: CC BY-SA 4.0
Post Revisions
6 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jun 17, 2023 at 21:03 | vote | accept | David Davidson | ||
| Jun 13, 2023 at 10:34 | comment | added | Mark Morgan Lloyd | I must admit that I found a few lines in "Cryptonomicon" to be a useful summary: Avi dictated a fingerprint to Randy over the 'phone, Randy collected Avi's public key from an accessible server, and later generated and sent his own public key to Avi encrypted with Avi's public key. | |
| Jun 13, 2023 at 4:41 | comment | added | David Davidson | Yes, DH is a form of public key cryptography. So it's still a fundamental change to the security model provided by asymmetric cryptography. | |
| Jun 13, 2023 at 3:41 | comment | added | Lie Ryan | If you have communication channel that is authenticated, but not encrypted, you can use Diffie Hellman to establish an encrypted channel with symmetric secret keys. | |
| Jun 12, 2023 at 13:44 | comment | added | Ja1024 | The channel only needs to provide authenticity, not secrecy. And in the case of certificate authorities, establishing such a channel is only difficult for the root certificates. Once a set of trusted root CAs is available (which come preinstalled in browsers, for example), you can simply use TLS to establish an authenticated channel to a CA, get a certificate from them and then use this certificate for an arbitrary number of your users. | |
| Jun 12, 2023 at 13:24 | history | answered | Ja1024 | CC BY-SA 4.0 |