If memory serves me correctly just use the newly agreed DH key (known
only to the two parties as of course this was never transmitted across
the wire) to create a hash (say SHA-256) and then use that (or part of
it) as your symmetric AES key.

Jim

On 08/01/07, dreijer <[EMAIL PROTECTED]> wrote:

Just reviving an old post here:
http://groups.google.com/group/cryptopp-users/browse_thread/thread/2ae27ef07cbc3d89/4c250c7fc606f355?lnk=st&q=DH+diffie+cryptopp&rnum=10

Is calculating a hash digest on the agreed DH key the common way of
generating an AES key (or any symmetric key cipher)?

Or do you instead just use the DH session key to securely communicate
and agree on another symmetric key, e.g. by having both ends generate
part of it?

Soren


>


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Crypto++ 
Users" group.
To post to this group, send email to [EMAIL PROTECTED]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/cryptopp-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to