Knowledge

Talk:Key exchange

Source 📝

71: 53: 22: 223: 167: 143: 341:, I believe that an example of out-of-band key exchange is having a business that gives all the employees the key on paper face-to-face knee-to-knee in the company's building so that all staff of the company can securely digitally communicate by using the key they all received. As for in-band key exchange, it seems that it is always vulnerable. -- 255:
I recently saw a puzzle: How do you post something in an unbreakable box to a friend, WITHOUT sending him a key to unlock it? The box needs two latches for locks. The solution is simple: A put on a lock (keeping the key), and post it to B. B put on a lock, keeping the key, and post it back. A removes
259:
I immediatly realized I can use this to send an encrypted message to a friend, WITHOUT us sharing ANY keys... A encrypt it with a long random key using XOR, and send it to B, while storing the key used locally. B does the same and return the message. A then decrypts it using the stored key, and post
288:
The above algorithm sends Secret Xor Key A from A to B, then sends Secret Xor Key A Xor Key B back to B. An observer can capture this, Xor those two messages and get key B, which is all that is needed to decrypt the final message, Secret Xor Key B sent from A to B. Thus a passive observer can
289:
intercept the secret, and an active one can edit it. So yes, it can transmit the secret, but it is not secure against an observer. Diffie–Hellman key exchange (which is included on the page) works in a similar way, but uses different primitives which remove this vulnerability.
309:
On SSL software (OpenSSL, PuTTY, ...) one hase options called similar to "Kex algorithm". I entered "Kex" on Knowledge and ended up on "Key exchange". The article does not mention the word "Kex". Now I asume "Kex" is simply short for
491:
In the search bar the current SD reads as "Cryptographic protocol enabling the sharing of a secret..." getting cut off. Takes more time that necessary to read and doesn't even finish its thought.
318:
change", but I can't be sure. So the article should at least have some short statement about it, especially because of the redirect and because one could think "Kex" is simply a typo for "Key". --
213: 404: 422: 418: 323: 565: 290: 125: 488:
is meant to differentiate the article quickly from similarly-titled articles in search results. It does not need to say as much as the lead sentence.
555: 207: 570: 560: 540: 119: 380: 304: 298: 327: 575: 550: 263:
I have tested this and of course it works for XOR encryption. Note that XOR-encryption can be secure if you use a long random key...
400:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
350: 390: 535: 470: 183: 281: 232: 153: 319: 250: 95: 346: 273: 174: 148: 260:
it back to B (deleting the key since it will no longer be used). B then decrypt using his key, and reads the message.
372: 545: 355: 78: 58: 494:
Contrast with the other search result which is "1985 American film". No mention of the film's premise. See also
421:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
342: 465: 33: 381:
https://web.archive.org/web/20141030210530/https://cryptocellar.web.cern.ch/cryptocellar/cesg/possnse.pdf
332: 521: 440:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
371:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 507: 498:
which has "Secure communication protocols". Both examples are a category with one adjective added.
294: 182:
on Knowledge. If you would like to participate, please visit the project page, where you can join
94:
on Knowledge. If you would like to participate, please visit the project page, where you can join
456: 21: 425:
before doing mass systematic removals. This message is updated dynamically through the template
384: 441: 391:
https://web.archive.org/web/20101116234929/http://www.cesg.gov.uk/publications/media/secenc.pdf
368: 277: 91: 428: 39: 475: 448: 269: 8: 517: 407:, "External links modified" talk page sections are no longer generated or monitored by 394: 447:
If you found an error with any archives or the URLs themselves, you can fix them with
503: 495: 513: 481: 413:. No special action is required regarding these talk page notices, other than 529: 485: 364: 179: 499: 414: 87: 83: 70: 52: 338: 266:
just wondering, how many times have this been invented before?
222: 385:
http://cryptocellar.web.cern.ch/cryptocellar/cesg/possnse.pdf
166: 142: 375:
for additional information. I made the following changes:
512:
OK, I see. I reverted the article back to your version.
395:
http://www.cesg.gov.uk/publications/media/secenc.pdf
178:, a collaborative effort to improve the coverage of 82:, a collaborative effort to improve the coverage of 417:using the archive tool instructions below. Editors 212:This article has not yet received a rating on the 124:This article has not yet received a rating on the 527: 256:A's lock, and post it to B. B removes B's lock. 339:https://en.wikipedia.org/search/?diff=810333708 403:This message was posted before February 2018. 566:Unknown-importance Computer science articles 19: 363:I have just modified 2 external links on 556:Unknown-importance Cryptography articles 528: 571:WikiProject Computer science articles 561:Start-Class Computer science articles 541:Unknown-importance Computing articles 172:This article is within the scope of 76:This article is within the scope of 15: 38:It is of interest to the following 13: 221: 192:Knowledge:WikiProject Cryptography 14: 587: 576:WikiProject Cryptography articles 551:Start-Class Cryptography articles 367:. Please take a moment to review 195:Template:WikiProject Cryptography 165: 141: 69: 51: 20: 104:Knowledge:WikiProject Computing 536:Start-Class Computing articles 328:14:19, 14 September 2015 (UTC) 107:Template:WikiProject Computing 1: 351:17:08, 14 November 2017 (UTC) 230:This article is supported by 186:and see a list of open tasks. 98:and see a list of open tasks. 471:13:38, 9 December 2017 (UTC) 299:03:16, 25 October 2014 (UTC) 282:08:57, 8 February 2012 (UTC) 251:Key exchange can be simpler? 233:WikiProject Computer science 7: 10: 592: 434:(last update: 5 June 2024) 360:Hello fellow Wikipedians, 305:"Kex" redirects here, why? 126:project's importance scale 343:NoToleranceForIntolerance 229: 211: 160: 123: 64: 46: 175:WikiProject Cryptography 522:09:18, 5 May 2024 (UTC) 508:21:23, 4 May 2024 (UTC) 356:External links modified 546:All Computing articles 226: 92:information technology 28:This article is rated 225: 198:Cryptography articles 79:WikiProject Computing 415:regular verification 405:After February 2018 333:Channel of exchange 459:InternetArchiveBot 410:InternetArchiveBot 227: 110:Computing articles 34:content assessment 486:short description 476:Short description 435: 272:comment added by 248: 247: 244: 243: 240: 239: 136: 135: 132: 131: 583: 469: 460: 433: 432: 411: 284: 214:importance scale 200: 199: 196: 193: 190: 169: 162: 161: 156: 154:Computer science 145: 138: 137: 112: 111: 108: 105: 102: 73: 66: 65: 55: 48: 47: 31: 25: 24: 16: 591: 590: 586: 585: 584: 582: 581: 580: 526: 525: 496:Forward secrecy 478: 463: 458: 426: 419:have permission 409: 373:this simple FaQ 358: 335: 307: 267: 253: 197: 194: 191: 188: 187: 151: 109: 106: 103: 100: 99: 32:on Knowledge's 29: 12: 11: 5: 589: 579: 578: 573: 568: 563: 558: 553: 548: 543: 538: 477: 474: 453: 452: 445: 398: 397: 389:Added archive 387: 379:Added archive 357: 354: 334: 331: 320:194.231.113.66 306: 303: 302: 301: 291:Craig Macomber 252: 249: 246: 245: 242: 241: 238: 237: 228: 218: 217: 210: 204: 203: 201: 184:the discussion 170: 158: 157: 146: 134: 133: 130: 129: 122: 116: 115: 113: 96:the discussion 74: 62: 61: 56: 44: 43: 37: 26: 9: 6: 4: 3: 2: 588: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 533: 531: 524: 523: 519: 515: 510: 509: 505: 501: 497: 492: 489: 487: 483: 473: 472: 467: 462: 461: 450: 446: 443: 439: 438: 437: 430: 424: 420: 416: 412: 406: 401: 396: 392: 388: 386: 382: 378: 377: 376: 374: 370: 366: 361: 353: 352: 348: 344: 340: 330: 329: 325: 321: 317: 313: 300: 296: 292: 287: 286: 285: 283: 279: 275: 271: 264: 261: 257: 235: 234: 224: 220: 219: 215: 209: 206: 205: 202: 185: 181: 177: 176: 171: 168: 164: 163: 159: 155: 150: 147: 144: 140: 139: 127: 121: 118: 117: 114: 97: 93: 89: 85: 81: 80: 75: 72: 68: 67: 63: 60: 57: 54: 50: 49: 45: 41: 35: 27: 23: 18: 17: 511: 493: 490: 479: 457: 454: 429:source check 408: 402: 399: 365:Key exchange 362: 359: 336: 315: 311: 308: 274:163.200.81.8 268:— Preceding 265: 262: 258: 254: 231: 189:Cryptography 180:Cryptography 173: 149:Cryptography 77: 40:WikiProjects 30:Start-class 530:Categories 466:Report bug 337:Regarding 514:IXNL-UUCP 482:IXNL-UUCP 449:this tool 442:this tool 101:Computing 88:computing 84:computers 59:Computing 455:Cheers.— 270:unsigned 369:my edit 500:Wizmut 90:, and 36:scale. 518:talk 504:talk 484:the 347:talk 324:talk 295:talk 278:talk 423:RfC 393:to 383:to 314:ey 208:??? 120:??? 532:: 520:) 506:) 436:. 431:}} 427:{{ 349:) 326:) 316:ex 297:) 280:) 152:: 86:, 516:( 502:( 480:@ 468:) 464:( 451:. 444:. 345:( 322:( 312:K 310:" 293:( 276:( 236:. 216:. 128:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Computing
WikiProject icon
WikiProject Computing
computers
computing
information technology
the discussion
???
project's importance scale
WikiProject icon
Cryptography
Computer science
WikiProject icon
WikiProject Cryptography
Cryptography
the discussion
???
importance scale
Taskforce icon
WikiProject Computer science
unsigned
163.200.81.8
talk
08:57, 8 February 2012 (UTC)
Craig Macomber
talk

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.