forgot to say at step  7 and 8 agreed upon encryption algorithm

On Wed, May 20, 2009 at 3:18 PM, AngelWarrior
<srikanth.bemin...@gmail.com>wrote:

> Thank you for replying.
> I am thinking of this design.Is this feasible.My design approach is mainly
> based on
> "I dont need to know with whom I am contacting but after contact my
> messages should be private."
>
> client(My own application)
> Server (My own application)
>
>
> 1.(client)create a normal socket and connect to the
> server
> 2.(server)After receiving the connection send deffie hellman  paramerters
> 3. (client)compute my key and pass the params for
> DH
> 4.(server)compute the key number
> 6. (client)Multiple(n==10) key exchange using
> DH
> 5. (server)Multiple(n==10) key exchange using DH
> 7.(server)generate the public key and encrypt with the key which we have
> already exchanged.
> 8.(server)Send the key to client and disconnect the normal socket.
> 10.(client)after receiving the key close the connection.
> 11.(client)Start a normal openssl connection.
>
> With Regards
>
>
>
>
>
>
> On Wed, May 20, 2009 at 2:48 PM, Victor Duchovni <
> victor.ducho...@morganstanley.com> wrote:
>
>> On Wed, May 20, 2009 at 02:37:58PM -0500, AngelWarrior wrote:
>>
>> > I need some Info.I have a client and server application which requires a
>> > secure medium for the transferring of data between each other. Currently
>> I
>> > am using openssl to achieve this using private and public key
>> certificates
>> > with RSA encryption. I don't want to ship the certificate with each
>> every
>> > and client application.
>> >
>> > So, Is there a method where I can transfer an on the fly created
>> certificate
>> > from the  server to the client  securely(like using diffi-hellman)   and
>> > after exchanging the certificates. I will communicate with the normal
>> > openssl process.
>>
>> Certifications are for *authentication*, which is only possible via:
>>
>>    - Prior bi-lateral exchange of keys (what you are doing now)
>> OR
>>    - Mediated key-exchange via a "trusted" introducer (the public CA
>>      model such as it is today)
>> OR
>>    - Scalable mediated introduction via a trusted online distributed
>>      database, i.e keys in a secure DNS. This has not happened yet,
>>      and may yet fail to materialize.
>>
>> If you need authentication, pick one of the first two. If you don't,
>> use anonymous ciphers and accept the risk of active man-in-the-middle
>> attacks, with TLS protecting you only against passive eavesdropping.
>>
>> --
>>        Viktor.
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>
>
>
> --
> _/\_
> With Regards
> SB Angel Warrior
>
>


-- 
_/\_
With Regards
SB Angel Warrior

Reply via email to