Coconote
AI notes
AI voice & video notes
Try for free
🔑
Encryption Key Exchange and Key Management
Jun 15, 2024
Encryption Key Exchange and Key Management
Overview
Importance of encryption keys being known only by sender and recipient
Logistical challenges of securely sharing encryption keys, especially over the internet
Key Exchange Methods
Out-of-Band Key Exchange
Transferring the key without using the network
Examples:
Delivering by hand (person with a briefcase)
Using a courier
Calling on the phone
In-person exchange
In-Band Key Exchange
Sending information across the network
Using additional encryption mechanisms to secure the key
Example: Asymmetric encryption to encrypt a symmetric key and sending it over the network
Asymmetric Key Encryption for Key Exchange
Encrypting a symmetric key with a server’s public key
Client sends the encrypted symmetric key to the server
Server decrypts with its private key
Use of session keys
Temporary and ephemeral
Discard and generate a new key for each session
Key Exchange Algorithms
Building symmetric keys without sending them over the network
Process:
Each party has a private key and the other’s public key
Combine own private key with the other’s public key
Mathematically related keys create the same symmetric key on both sides
Applications of key exchange algorithms (Not for encryption or hashing)
📄
Full transcript