Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. Algorithms
  4. What kind of the key exchange protocol better to use in my symmetric key algorithm?

What kind of the key exchange protocol better to use in my symmetric key algorithm?

Scheduled Pinned Locked Moved Algorithms
algorithmssecurityquestion
3 Posts 2 Posters 8 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C Offline
    C Offline
    Cryptogrpahy
    wrote on last edited by
    #1

    I have found Diffie-Hellman_key_exchange protocol ready and wanted to use it in my new algorithm but is that best one in the key exchange protocols? I need to make sure that protocol is suit for 32 bytes of the 8 bits key exchange before i use it in my algorithm. Most of the literature said that cryptographic algorithm could be good and perfect strength but using key exchange protocol should be enough strong security as the algorithm strong then whole algorithm can be said complete powerful one. Please share me if you know about key exchange secret protocols. Which one is better to use it? My key generator is based one the 8 bits key. Algorithm input is 8 bits and output 32 bytes. Suggest me any thing else? Thank you

    C 1 Reply Last reply
    0
    • C Cryptogrpahy

      I have found Diffie-Hellman_key_exchange protocol ready and wanted to use it in my new algorithm but is that best one in the key exchange protocols? I need to make sure that protocol is suit for 32 bytes of the 8 bits key exchange before i use it in my algorithm. Most of the literature said that cryptographic algorithm could be good and perfect strength but using key exchange protocol should be enough strong security as the algorithm strong then whole algorithm can be said complete powerful one. Please share me if you know about key exchange secret protocols. Which one is better to use it? My key generator is based one the 8 bits key. Algorithm input is 8 bits and output 32 bytes. Suggest me any thing else? Thank you

      C Offline
      C Offline
      cp9876
      wrote on last edited by
      #2

      I don't understand how you can expect any sort of credible security using an 8 bit key - there are only 256 different keys to try so an exhaustive search would be trivial. Diffie-Hellman has a good reputation as a key exchange algorithm, and is used in many standard security protocols. You need to ensure that you use large numbers or else the algorithm can be inverted. I'd suggest you read Applied Cryptography[^]


      Peter "Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."

      C 1 Reply Last reply
      0
      • C cp9876

        I don't understand how you can expect any sort of credible security using an 8 bit key - there are only 256 different keys to try so an exhaustive search would be trivial. Diffie-Hellman has a good reputation as a key exchange algorithm, and is used in many standard security protocols. You need to ensure that you use large numbers or else the algorithm can be inverted. I'd suggest you read Applied Cryptography[^]


        Peter "Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."

        C Offline
        C Offline
        Cryptogrpahy
        wrote on last edited by
        #3

        Yes. Peter That is good book. I'll do. So I think you need to know my problem first then you may say me what to do. I have only stable 0...256 number in decimal for input. That can be converted into the binary as one byte. Mission is keep security. I have gotten same idea with you since i saw it first time. This only 256 keys. Anyone can find it. In this case, how can i keep the security? Maybe you suggest me not only cryptography but also another thing to use it? If you have any idea please share me. I'm still in the trouble because of input 0...256 in decimal. thank you

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups