Secure Key Exchange

This cluster focuses on discussions of cryptographic techniques for secure key exchange, particularly Diffie-Hellman and public key methods, to enable encrypted communication over untrusted channels while addressing man-in-the-middle attacks and forward secrecy.

📉 Falling 0.5x Security
4,613
Comments
20
Years Active
5
Top Authors
#9082
Topic ID

Activity Over Time

2007
3
2008
13
2009
38
2010
75
2011
101
2012
120
2013
401
2014
293
2015
323
2016
279
2017
387
2018
339
2019
329
2020
410
2021
361
2022
265
2023
322
2024
292
2025
254
2026
8

Keywords

PSTN GCM SSH MITM RSA WASM X509 FarmVille ECDHE PGP key public key keys messages exchange encrypted encryption public attacker pgp

Sample Comments

TazeTSchnitzel Oct 3, 2017 View on HN

No, because of public key cryptography. Neither side ever exchanges private keys in the clear.

You're assuming that there isn't a shared secret between the sender and reciever.

rmbyrro Mar 4, 2022 View on HN

Couldn't this be solved by Diffie-Helman key exchange? [1][1] https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exc...

jayd16 Jan 20, 2020 View on HN

Looks like the message is encrypted with a key derived by both parties but this produces a symmetric encryption. The client then has the ability to spoof encrypted server communications.

_twqs Dec 4, 2022 View on HN

You can exchange keys securely over an untrusted channel.https://en.m.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_e...

ihuman Mar 2, 2016 View on HN

You can't just use some kind of Diffie–Hellman key exchange to agree on a key, instead of the user copying the key?

StavrosK Oct 18, 2013 View on HN

How are you going to send the key over the wire without anyone intercepting it?

withinboredom Jul 15, 2023 View on HN

You still need to exchange keys. You can't get around that. Otherwise, how do I know the public key you sent me over the radio is YOUR public key and not someone else with a more powerful radio?

matt3210 Sep 12, 2023 View on HN

Secure key exchange is a good idea, but your method hides the data, but not the source or destination

dcow Mar 19, 2025 View on HN

Only naively. You can do a key exchange.