There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

You are viewing a single thread.
View all comments
4 points
*

This is the video that finally explained it in a way that I totally understood.

TLDW: the actual key exchange works by using massive exponents that are very fast to run to get a result, but very hard to use that result to get the exponent you started with

permalink
report
reply
5 points

Adding on to your TLDR: There’s also asymmetric cryptography based on elliptic curves, so it’s not always an exponent of two massive primes.

permalink
report
parent
reply
1 point

Even of isogenies of elliptic curves

permalink
report
parent
reply

Security

!security@lemmy.ml

Create post

Confidentiality Integrity Availability

Community stats

  • 50

    Monthly active users

  • 198

    Posts

  • 340

    Comments

Community moderators