There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

You are viewing a single thread.
View all comments View context
1 point

I don’t think DH is accurately relating to this. DH key exchange is used to generate a shared secret to use symmetric cryptography by two entities from (generally temporary) private keys, which are not specifically associated with a public key (this is not a public/private key pair)

To me, two examples of public/private key usage are RSA (asymmetric cryptography) and for example SSH authentication with a key pair. DH key exchange can be used in SSH to encrypt communication, before authentication even begins

permalink
report
parent
reply
2 points

Published in 1976 by Diffie and Hellman, this is the earliest publicly known work that proposed the idea of a private key and a corresponding public key.

https://en.wikipedia.org/wiki/Diffie–Hellman_key_exchange

permalink
report
parent
reply

Security

!security@lemmy.ml

Create post

Confidentiality Integrity Availability

Community stats

  • 55

    Monthly active users

  • 214

    Posts

  • 342

    Comments

Community moderators