4359 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
  • thumbnail
    key exchange - why do we need Diffie Hellman? - Cryptography Stack Exchange

    Des réponses à une question que je me posais :

    I assume you're talking about SSL/TLS or a similar protocol. In these protocols there are two reasons to use Diffie-Hellman:

    Your certificate only supports signing
    Either it is an RSA certificate restricted to signing, or it uses an algorithm that doesn't support encryption, such as DSA or ECDSA.
    Forward security - What happens if the server's private key gets leaked somehow?
    If you simply encrypted the session key to the server's public key, all past communication with that server can be decrypted. Which is very bad.
    If an ephemeral Diffie-Hellman key-exchange was used, a private key leak won't compromize past communications, since the keys used for the key exchange are long gone, and the leaked long term key was only used for authentication and not for confidentiality.
    You don't know the public key of the other side
    There are situations where you don't know the other side's public key, but you have a different way to authenticate them. In that case you can use anonymous Diffie-Hellman together with that other way. For example TLS supports authentication based on a symmetric shared secret in a way that's secure against MitM.

    Some other protocols such as CurveCP use EC Diffie-Hellman for both authentication and key-exchange. In this case they profit from the performance advantage elliptic curves have over RSA.

    June 7, 2013 at 11:01:24 PM GMT+2 - permalink - archive.org - http://crypto.stackexchange.com/questions/3163/why-do-we-need-diffie-hellman
    ipsec
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation