In symmetric-key cryptography, both parties must possess a secret key that they must exchange prior to using any encryption. Distribution of secret keys is problematic: it involves face-to-face meetings, the use of a trusted courier, or sending the key through an existing encryption channel.
Questions tagged [key-distribution]
46 questions
26
votes
4 answers
What makes Quantum Cryptography secure?
This is my current understanding of how Quantum Cryptography works: (The first bit is Quantum Key Distribution)
Alice sends a beam of photons to Bob through a quantum channel such as an optical fiber. Each of these photons represent a bit of…
lal lal
- 373
- 3
- 7
15
votes
4 answers
How is the key shared in symmetric key cryptography?
Symmetric key cryptography is an encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.
Is the key public or it is secret? How can the sender and the receiver both…
Aria
- 721
- 3
- 9
- 18
8
votes
1 answer
Key Exchange & key Distribution in symmetric key cryptography
I want to know whether there is a difference between key exchange & key distribution in private key cryptography as well as public key cryptography?
or is it the same term?
Smita Chaudhari
- 81
- 2
6
votes
1 answer
Is E91 safer than BBM92?
I would like to compare the security of these two QKD protocols which both use entangled photons that are distributed between the users Alice and Bob. In the case of E91, the photon is measured randomly in 3 different bases which allows to violate a…
Mechanix
- 61
- 3
6
votes
2 answers
What are the current known weaknesses/attacks on quantum key distribution?
I am writing a paper on the implementation of QKD in the future. I want to know if there are any viable attacks on the BB84 protocol or QKD in general? I know of the Photon Number Splitting attack or spectroscopy in the case of diode manufacturing…
Kenneth
- 61
- 2
6
votes
1 answer
Proof of correct construction of a private key in distributed cryptography
In an exponential ElGamal encryption scheme where the key generation is done in a distributed way among $n$ trustees we have that each trustee $i$ (where $1 \leq i \leq n$):
Selects a private key share $x_i \in \mathbb{Z}_q^{\star}$.
Computes a…
LRM
- 1,406
- 12
- 24
5
votes
1 answer
Understanding Quantum Key Distribution
I have watched dozens of videos on YouTube talking about quantum cryptography and how the BB84 algorithm works. However, none of them bothered to explain how the quantum key exchange process works in detail; that is, for newbies like me. Thus I…
ecdhe
- 151
- 3
4
votes
3 answers
Why in one time pad must the key distribution to be truly random
One time pad required a truly random key.
Why canwt it be a psudo-random key?
For example, if the key distribution is that for each bit the probability to get 1 is 0.6 and the probability to get 0 is 0.4, and the eavesdropper knows it, how can he…
NavGino
- 49
- 2
4
votes
3 answers
How are one-time pads distributed?
It seems that OTP encryption is unbreakable. I have read some articles (Wikipedia, Blogpost, etc.), but I could not find any information about how they are used.
If I wanted to create a messenger service, how would I distribute the OTP keys? Both…
yamm
- 153
- 1
- 5
3
votes
1 answer
Public Keys on Social Media
Is there any problem with using social media (i.e. Facebook) as a directory of public keys?
For example, couldn't Alice put a note containing $(g^a \bmod p, g, p)$ on her Facebook page so she could receive email attachments which have been encrypted…
Ken
- 31
- 1
3
votes
2 answers
How to generate Multiple Encryption Keys for use in RSA polymorphic multiplication
I am a long time scroller, first time poster in the crypto stack. I've recently been finding myself leaving the realm of mainstream/standard crypto (imo that consists of symmetric/asymmetric encryption, some ciphers and one way hash functions ect).…
Dimitree
- 39
- 2
3
votes
0 answers
Difference between group key agreement, group key sharing, group key distribution and group key establishement
I am currently doing a survey on group key, and throughout my readings, I stumbled on these different terms: Group Key agreement, Group key Sharing, Group key distribution, and Group key establishment.
My question is the following: is there a…
vxek
- 551
- 3
- 10
3
votes
3 answers
Struggling to understand Perfect Forward Secrecy
From the definition on Wikipedia:
In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if the…
pfsconfusor
- 31
- 3
3
votes
0 answers
Reduction from integer factoring to computational Diffie Hellman
The computational Diffie Hellman (CDH) problem for ${\mathbb{Z}}^*_p$ is given a prime $p$, a generator $g$ of ${\mathbb{Z}}^*_p$, and a pair $(g^i, g^j)$ to compute $g^{ij}$. The value $g$ is called the base. In cryptographic protocols the base is…
duckstar
- 269
- 1
- 6
3
votes
1 answer
Does an EC signature preserve entropy?
Assume I have a perfect source of entropy, which is unknown to me, and is used to generate a private key (also unknown to me, but usable).
If I make a signature with this unknown private key on a constant piece of data (e.g. hash('foo')) and then…
asmiller
- 133
- 3