Score:1

What can I use for key exchange?

cn flag

I am trying to send AES keys from one computer to another, but I need to provide some form of attestation of the key's provenance. How should I go about doing this?

Score:1
gb flag

If you are implementing this for commercial purpose, respectively if security is crucial, then there are standards and somewhat "best practices" (like the TLS Protocol Specs).

In general when you want two parties to agree on a shared secret key, some kind of Key-Exchange like Diffie-Hellman or ECDH is applied. Often this goes hand-in-hand with some KDF (key derivation function).

Another approach would be the usage of KEMs (key encapsulation mechanism), but as far as I know these kind of techniques are not widely used (yet! their time will come).

So without further information on your exact problem and use case, I would suggest taking a look into:

  • DH (Diffie-Hellman)
  • ECDH (Elliptic Curve Diffie-Hellman)
  • KDFs (Key Derivation Functions)
  • KEMs (Key Encapsulation Mechanisms)

Note that there are reliable frameworks and libraries out there, which (probably) already implement the stuff that you need.

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.