29
submitted 6 months ago by t0mri@lemmy.ml to c/security@lemmy.ml

There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

you are viewing a single comment's thread
view the rest of the comments
[-] pivot_root@lemmy.world 5 points 6 months ago

Adding on to your TLDR: There's also asymmetric cryptography based on elliptic curves, so it's not always an exponent of two massive primes.

[-] bloubz@lemmygrad.ml 1 points 6 months ago

Even of isogenies of elliptic curves

this post was submitted on 28 Apr 2024
29 points (78.4% liked)

Security

5014 readers
1 users here now

Confidentiality Integrity Availability

founded 4 years ago
MODERATORS