Skip to main content

Questions tagged [diffie-hellman]

The Diffie–Hellman key agreement is an anonymous, non-authenticated key-agreement protocol.

1 vote
1 answer
133 views

How is Diffie Hellman PKE with Ephemeral keys performed using Kerberos and KINIT? Has it been implemented yet in MIT or Heimdal Kerberos? I think it might be RFC 9528. I ask because I can't seem to ...
atod's user avatar
  • 47
0 votes
2 answers
231 views

Consider this scenario in an HTTPS (m)TLS [*] request: A trusted client sends a select query (the request) to a read-only database server The server uses a self-signed certificate, so it is ...
SOFe's user avatar
  • 133
3 votes
1 answer
545 views

What are is the threat vector comparison using 'pkinit' (public-key) vs 'kinit' (password hash) with Kerberos for authentication and distribution of session keys (CK)? On Unix OS? I'm finding the ...
atod's user avatar
  • 47
3 votes
1 answer
450 views

I am struggling to understand the value of ECIES in a offline message encryption scheme with shared static ECDH keys. So if Bob and Alice each have a static public ECDH key stored in a directory. Each ...
Rowan Smith's user avatar
1 vote
2 answers
574 views

As Whatsapp uses Diffie-Hellman algorithm for a key exchange and SSL certification ensures the authenticity of its server for the end user like me. As per my understanding, messages first has to go to ...
Nikh's user avatar
  • 11
1 vote
0 answers
211 views

I´m currently building a protocol, in which two parties establish a connection via ECDH Key Establishment. The shared secret after ECDH is used to derivate Keys (with HKDF) for symmetric encryption. ...
Jonas's user avatar
  • 11
1 vote
0 answers
130 views

As I was listening to an interview yesterday, the journalist claimed that his Signal communications were being spied on by the NSA. Whether to believe him or not is subjective. Still, it is an ...
enricobottazzi's user avatar
5 votes
1 answer
676 views

Let's assume that authentication with certificates has been well performed, next step is to generate short-term private&public ECC keys for ECDH shared key computation. Alice: Generates keyA with ...
unalignedmemoryaccess's user avatar
0 votes
1 answer
1k views

The Subject Public Key Info field can have a value like ECDSA_P256 or ECDH_P256 when ECC is used. Why is it not sufficient to specify "ECC_P256"? In other words, why is it not enough to ...
Lemon Sky's user avatar
  • 195
3 votes
1 answer
801 views

I've been reading lately about the Double Ratchet protocol, how it works conceptually. I understand generally the idea behind the protocol, that it provides Forward Secrecy and Post-Compromise ...
cliffroot's user avatar
  • 133
2 votes
1 answer
243 views

I came across a packet capture in Wireshark where p length = 257 bytes and pubkey length = 256 bytes. See the ServerKeyExchange snip below: Diffie-Hellman Server Params p Length: 257 p: ...
kelsonic's user avatar
6 votes
2 answers
12k views

When I try to connect to the site https://api-mte.itespp.org with OpenSSL (openssl s_client -connect api-mte.itespp.org:443 -brief), it complains that the DH key is too small. But when I analyze its ...
geckels1's user avatar
  • 163
1 vote
2 answers
297 views

I understand that in a non-authenticated Diffie-Hellman setup, a man-in-the-middle attack can occur. Now i'm curious about the feasibility of the following scenario: Let's assume a situation where www....
SempriGno's user avatar
2 votes
2 answers
269 views

With Fido2 becoming more popular we see more and more affordable Fido2 hardware security keys on the market. Can we use those tokens also for establishing a shared secret between two tokens? I would ...
Steffen Vogel's user avatar
1 vote
0 answers
164 views

I have discovered that Diffie Hellman(DH)shared key is unequal in Apple Numbers, Google Sheets, and Mac Excel (2008). In Section 1.0, the first try at a solution uses a small Prime to produce certain ...
Simple.Simon's user avatar

15 30 50 per page
1
2 3 4 5
20