71:
53:
22:
223:
167:
143:
341:, I believe that an example of out-of-band key exchange is having a business that gives all the employees the key on paper face-to-face knee-to-knee in the company's building so that all staff of the company can securely digitally communicate by using the key they all received. As for in-band key exchange, it seems that it is always vulnerable. --
255:
I recently saw a puzzle: How do you post something in an unbreakable box to a friend, WITHOUT sending him a key to unlock it? The box needs two latches for locks. The solution is simple: A put on a lock (keeping the key), and post it to B. B put on a lock, keeping the key, and post it back. A removes
259:
I immediatly realized I can use this to send an encrypted message to a friend, WITHOUT us sharing ANY keys... A encrypt it with a long random key using XOR, and send it to B, while storing the key used locally. B does the same and return the message. A then decrypts it using the stored key, and post
288:
The above algorithm sends Secret Xor Key A from A to B, then sends Secret Xor Key A Xor Key B back to B. An observer can capture this, Xor those two messages and get key B, which is all that is needed to decrypt the final message, Secret Xor Key B sent from A to B. Thus a passive observer can
289:
intercept the secret, and an active one can edit it. So yes, it can transmit the secret, but it is not secure against an observer. Diffie–Hellman key exchange (which is included on the page) works in a similar way, but uses different primitives which remove this vulnerability.
309:
On SSL software (OpenSSL, PuTTY, ...) one hase options called similar to "Kex algorithm". I entered "Kex" on
Knowledge and ended up on "Key exchange". The article does not mention the word "Kex". Now I asume "Kex" is simply short for
491:
In the search bar the current SD reads as "Cryptographic protocol enabling the sharing of a secret..." getting cut off. Takes more time that necessary to read and doesn't even finish its thought.
318:
change", but I can't be sure. So the article should at least have some short statement about it, especially because of the redirect and because one could think "Kex" is simply a typo for "Key". --
213:
404:
422:
418:
323:
565:
290:
125:
488:
is meant to differentiate the article quickly from similarly-titled articles in search results. It does not need to say as much as the lead sentence.
555:
207:
570:
560:
540:
119:
380:
304:
298:
327:
575:
550:
263:
I have tested this and of course it works for XOR encryption. Note that XOR-encryption can be secure if you use a long random key...
400:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
350:
390:
535:
470:
183:
281:
232:
153:
319:
250:
95:
346:
273:
174:
148:
260:
it back to B (deleting the key since it will no longer be used). B then decrypt using his key, and reads the message.
372:
545:
355:
78:
58:
494:
Contrast with the other search result which is "1985 American film". No mention of the film's premise. See also
421:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
342:
465:
33:
381:
https://web.archive.org/web/20141030210530/https://cryptocellar.web.cern.ch/cryptocellar/cesg/possnse.pdf
332:
521:
440:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
371:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
507:
498:
which has "Secure communication protocols". Both examples are a category with one adjective added.
294:
182:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
94:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
456:
21:
425:
before doing mass systematic removals. This message is updated dynamically through the template
384:
441:
391:
https://web.archive.org/web/20101116234929/http://www.cesg.gov.uk/publications/media/secenc.pdf
368:
277:
91:
428:
39:
475:
448:
269:
8:
517:
407:, "External links modified" talk page sections are no longer generated or monitored by
394:
447:
If you found an error with any archives or the URLs themselves, you can fix them with
503:
495:
513:
481:
413:. No special action is required regarding these talk page notices, other than
529:
485:
364:
179:
499:
414:
87:
83:
70:
52:
338:
266:
just wondering, how many times have this been invented before?
222:
385:
http://cryptocellar.web.cern.ch/cryptocellar/cesg/possnse.pdf
166:
142:
375:
for additional information. I made the following changes:
512:
OK, I see. I reverted the article back to your version.
395:
http://www.cesg.gov.uk/publications/media/secenc.pdf
178:, a collaborative effort to improve the coverage of
82:, a collaborative effort to improve the coverage of
417:using the archive tool instructions below. Editors
212:This article has not yet received a rating on the
124:This article has not yet received a rating on the
527:
256:A's lock, and post it to B. B removes B's lock.
339:https://en.wikipedia.org/search/?diff=810333708
403:This message was posted before February 2018.
566:Unknown-importance Computer science articles
19:
363:I have just modified 2 external links on
556:Unknown-importance Cryptography articles
528:
571:WikiProject Computer science articles
561:Start-Class Computer science articles
541:Unknown-importance Computing articles
172:This article is within the scope of
76:This article is within the scope of
15:
38:It is of interest to the following
13:
221:
192:Knowledge:WikiProject Cryptography
14:
587:
576:WikiProject Cryptography articles
551:Start-Class Cryptography articles
367:. Please take a moment to review
195:Template:WikiProject Cryptography
165:
141:
69:
51:
20:
104:Knowledge:WikiProject Computing
536:Start-Class Computing articles
328:14:19, 14 September 2015 (UTC)
107:Template:WikiProject Computing
1:
351:17:08, 14 November 2017 (UTC)
230:This article is supported by
186:and see a list of open tasks.
98:and see a list of open tasks.
471:13:38, 9 December 2017 (UTC)
299:03:16, 25 October 2014 (UTC)
282:08:57, 8 February 2012 (UTC)
251:Key exchange can be simpler?
233:WikiProject Computer science
7:
10:
592:
434:(last update: 5 June 2024)
360:Hello fellow Wikipedians,
305:"Kex" redirects here, why?
126:project's importance scale
343:NoToleranceForIntolerance
229:
211:
160:
123:
64:
46:
175:WikiProject Cryptography
522:09:18, 5 May 2024 (UTC)
508:21:23, 4 May 2024 (UTC)
356:External links modified
546:All Computing articles
226:
92:information technology
28:This article is rated
225:
198:Cryptography articles
79:WikiProject Computing
415:regular verification
405:After February 2018
333:Channel of exchange
459:InternetArchiveBot
410:InternetArchiveBot
227:
110:Computing articles
34:content assessment
486:short description
476:Short description
435:
272:comment added by
248:
247:
244:
243:
240:
239:
136:
135:
132:
131:
583:
469:
460:
433:
432:
411:
284:
214:importance scale
200:
199:
196:
193:
190:
169:
162:
161:
156:
154:Computer science
145:
138:
137:
112:
111:
108:
105:
102:
73:
66:
65:
55:
48:
47:
31:
25:
24:
16:
591:
590:
586:
585:
584:
582:
581:
580:
526:
525:
496:Forward secrecy
478:
463:
458:
426:
419:have permission
409:
373:this simple FaQ
358:
335:
307:
267:
253:
197:
194:
191:
188:
187:
151:
109:
106:
103:
100:
99:
32:on Knowledge's
29:
12:
11:
5:
589:
579:
578:
573:
568:
563:
558:
553:
548:
543:
538:
477:
474:
453:
452:
445:
398:
397:
389:Added archive
387:
379:Added archive
357:
354:
334:
331:
320:194.231.113.66
306:
303:
302:
301:
291:Craig Macomber
252:
249:
246:
245:
242:
241:
238:
237:
228:
218:
217:
210:
204:
203:
201:
184:the discussion
170:
158:
157:
146:
134:
133:
130:
129:
122:
116:
115:
113:
96:the discussion
74:
62:
61:
56:
44:
43:
37:
26:
9:
6:
4:
3:
2:
588:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
533:
531:
524:
523:
519:
515:
510:
509:
505:
501:
497:
492:
489:
487:
483:
473:
472:
467:
462:
461:
450:
446:
443:
439:
438:
437:
430:
424:
420:
416:
412:
406:
401:
396:
392:
388:
386:
382:
378:
377:
376:
374:
370:
366:
361:
353:
352:
348:
344:
340:
330:
329:
325:
321:
317:
313:
300:
296:
292:
287:
286:
285:
283:
279:
275:
271:
264:
261:
257:
235:
234:
224:
220:
219:
215:
209:
206:
205:
202:
185:
181:
177:
176:
171:
168:
164:
163:
159:
155:
150:
147:
144:
140:
139:
127:
121:
118:
117:
114:
97:
93:
89:
85:
81:
80:
75:
72:
68:
67:
63:
60:
57:
54:
50:
49:
45:
41:
35:
27:
23:
18:
17:
511:
493:
490:
479:
457:
454:
429:source check
408:
402:
399:
365:Key exchange
362:
359:
336:
315:
311:
308:
274:163.200.81.8
268:— Preceding
265:
262:
258:
254:
231:
189:Cryptography
180:Cryptography
173:
149:Cryptography
77:
40:WikiProjects
30:Start-class
530:Categories
466:Report bug
337:Regarding
514:IXNL-UUCP
482:IXNL-UUCP
449:this tool
442:this tool
101:Computing
88:computing
84:computers
59:Computing
455:Cheers.—
270:unsigned
369:my edit
500:Wizmut
90:, and
36:scale.
518:talk
504:talk
484:the
347:talk
324:talk
295:talk
278:talk
423:RfC
393:to
383:to
314:ey
208:???
120:???
532::
520:)
506:)
436:.
431:}}
427:{{
349:)
326:)
316:ex
297:)
280:)
152::
86:,
516:(
502:(
480:@
468:)
464:(
451:.
444:.
345:(
322:(
312:K
310:"
293:(
276:(
236:.
216:.
128:.
42::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.