As per my understanding, using public key cryptography for encryption is much 
more expensive than using symmetric key cryptography. So generally the main 
communication is encrypted using symmetric key cryptography, whereas public key 
cryptography is used to exchange keys and other information that will be used 
for symmetric key cryptography.
Secondly, if someone manages to guess/retrieve the key used for symmetric key 
cryptography, s/he can only decrypt the current session. As new session keys 
are generated every time, the other communications are still safe.

HTH.

Group,
Please correct me if I am wrong.

~ Urjit
  ----- Original Message -----
  From: jackie jackie
  To: openssl-users@openssl.org
  Sent: Saturday, June 23, 2007 3:50 AM
  Subject: RSA and DH


  Hi,

  I am a newbie to SSL as well as RSA security etc. However read quite a bit of 
books and on the net.
  But one thing flew over my head. Pl. see if any can help me understand the 
following.

  Suppose server and client used RSA based private/public key pairs. I 
understood that
  these would be used to authenticate each other.

  Leaving DSA totally aside, considering only RSA alone, I did not fully 
understand what
  DH params are being used for in such communication. There is some explanation
  about DH params need in terms of key exchange etc, but did not follow. Looked
  around quite a bit, but not found a clear/direct answer.

  The article at

  http://support.microsoft.com/kb/257591

  tries to explain somewhat but is at very high level and does not even mention 
DH
  params by name at all.

  My vague understanding is that, though RSA based private/public key pair is
  useful for authentication, but there still appears to be a need to generate 
(symmetric ones ?)
  some keys for encryption on a session by session basis. It appears that
  either temporary RSA keys (not used it seems to due to some security 
violations.
  OK , fine) and DH params can be used. This is thing went over my head.
  I did not understand
       - why is there a need for generating session to session keys




DISCLAIMER
==========
This e-mail may contain privileged and confidential information which is the 
property of Persistent Systems Pvt. Ltd. It is intended only for the use of the 
individual or entity to which it is addressed. If you are not the intended 
recipient, you are not authorized to read, retain, copy, print, distribute or 
use this message. If you have received this communication in error, please 
notify the sender and delete all copies of this message. Persistent Systems 
Pvt. Ltd. does not accept any liability for virus infected mails.
  • RSA and DH jackie jackie
    • Re: RSA and DH Urjit Gokhale

Reply via email to