If memory serves me correctly just use the newly agreed DH key (known only to the two parties as of course this was never transmitted across the wire) to create a hash (say SHA-256) and then use that (or part of it) as your symmetric AES key.
Jim On 08/01/07, dreijer <[EMAIL PROTECTED]> wrote:
Just reviving an old post here: http://groups.google.com/group/cryptopp-users/browse_thread/thread/2ae27ef07cbc3d89/4c250c7fc606f355?lnk=st&q=DH+diffie+cryptopp&rnum=10 Is calculating a hash digest on the agreed DH key the common way of generating an AES key (or any symmetric key cipher)? Or do you instead just use the DH session key to securely communicate and agree on another symmetric key, e.g. by having both ends generate part of it? Soren >
--~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To post to this group, send email to [EMAIL PROTECTED] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/cryptopp-users?hl=en -~----------~----~----~----~------~----~------~--~---
