All Questions
Tagged with symmetric key-exchange
37
questions
1
vote
0
answers
41
views
In Kerberos, is the "Authentication Server" the only "Trusted Third Party"? Or is "Ticket Granting Server" also a "Trusted Third Party"? [closed]
I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS).
But what about TGS (Ticket Granting Server)? It also ...
0
votes
0
answers
35
views
Does Qrypt's BLAST protocol based on "Doubly-Affine Extractors" use public-key or symmetric-key cryptography?
The company Qrypt states that "Key distribution based on asymmetric algorithms is a weak link for cryptography" and claims to "enable encryption without distributing encryption keys&...
1
vote
0
answers
59
views
Linux Kernel CryptoAPI key exchange and key derivation
I have a custom network and I want to implement a symmetric key exchange and key derivation mechanism with ECDH.
I know that I need to use KPP API and ECDH helper functions, but I can't find any code ...
1
vote
0
answers
99
views
What is the most secure hybrid cipher suite(Library) possible today?
What combination of public key cryptography (DH) and symmetric key cryptography is currently available that is (subjectively) as secure as possible over other ciphers (AES,curve448) when security is ...
1
vote
1
answer
527
views
Sending encrypted message without public key from recipient (elgamal)
assume Bob and Alice use Elgamal encryption scheme. Alice wants to send Bob a message, but does not know Bobs public key. Is there a way for Alice to find out Bobs public key by receiving multiple ...
2
votes
1
answer
319
views
If the symmetric key is stolen; can I key revoke without reencrypted data?
I have a question about database security. This is a scenario I have.
The data is encrypted using symmetric (i.e., AES) and stored in a database, while the secret key is stored on the client side, so ...
3
votes
3
answers
1k
views
How to interpret my professor's statement about "seed" and "symmetric-key encryption"?
In the cryptography course, the professor said that:
these days for symmetric key encryption, instead of sending out the key, Alice sends the seed to Bob, and then based on that Bob can get the key.
...
1
vote
1
answer
40
views
How to calculate a common encryption key between sender and receiver
In the picture below, for the text underlined in red color: 7X(MOD 11) = 72(MOD 11) =49(MOD 11)
My questions are:
(1) obviously there is no equal relationship between 72(MOD 11) and 49 (MOD 11), and ...
1
vote
1
answer
134
views
Is there any standard present to measure strength of a generated key using true random number generator?
I was wondering how to measure the security strength of a generated secret key for the below protocol:
"A 128 bit random number is generated by TRNG and the random number will be used as a ...
0
votes
0
answers
171
views
Key storage management of session keys and long term keys
In key management, one of the topics is key storage, I want to know where and how these keys(long-term and short-term) are stored?
For example I read that android password apps use KeyStore api to ...
0
votes
1
answer
79
views
Symmetric Exchange Key Sharing
Question:
Suppose that there are 10000 = 10^4 banks and 10 payment card organisations (PCOs).
How many secret keys will be needed if each PCO shares a unique secret key with each bank?
How many extra ...
3
votes
1
answer
495
views
Can Key-Encryption Key (KEK) be symmetric?
This from Cryptography course from Coursera:
Key wrapping or encapsulation using a KEK can be accomplished using
either symmetric or asymmetric cipher
For my information KEK solves the key ...
2
votes
1
answer
2k
views
How to generate the exact AES key in both client and server side?
I am using AES to create a secure tunnel for transmission of data.
As the symmetric key encryption will require the same key to encrypt and decrypt, so we need to generate the exact same key for the ...
1
vote
0
answers
38
views
Server distributing/sharing a symmetric key to one or more clients via an established secure connection?
I have a server and a client device that share two separate data channels that each need to have authentication and encryption protections.
When a connection is made over data channel 1, it is secured ...
0
votes
0
answers
32
views
Are there any known problems performing a One-time pad with 2 keys stored separately - AKA 2 part Symmetric key exchange over TLS
If this is something that already has a name, please tell me to look at that, but I have not been able to find one yet.
I am considering this process for storing some data securely. I want to ...