Skip to main content
6 events
when toggle format what by license comment
Jun 17, 2023 at 21:03 vote accept David Davidson
Jun 13, 2023 at 10:34 comment added Mark Morgan Lloyd I must admit that I found a few lines in "Cryptonomicon" to be a useful summary: Avi dictated a fingerprint to Randy over the 'phone, Randy collected Avi's public key from an accessible server, and later generated and sent his own public key to Avi encrypted with Avi's public key.
Jun 13, 2023 at 4:41 comment added David Davidson Yes, DH is a form of public key cryptography. So it's still a fundamental change to the security model provided by asymmetric cryptography.
Jun 13, 2023 at 3:41 comment added Lie Ryan If you have communication channel that is authenticated, but not encrypted, you can use Diffie Hellman to establish an encrypted channel with symmetric secret keys.
Jun 12, 2023 at 13:44 comment added Ja1024 The channel only needs to provide authenticity, not secrecy. And in the case of certificate authorities, establishing such a channel is only difficult for the root certificates. Once a set of trusted root CAs is available (which come preinstalled in browsers, for example), you can simply use TLS to establish an authenticated channel to a CA, get a certificate from them and then use this certificate for an arbitrary number of your users.
Jun 12, 2023 at 13:24 history answered Ja1024 CC BY-SA 4.0