Questions tagged [symmetric]
The symmetric tag has no summary.
6 questions
1 vote
0 answers
95 views
How can intermediary devices securely forward traffic using only session IDs in a symmetric encryption system, without risking MITM attacks? [closed]
I'm imagining a Utopian world where the internet nowadays doesn't have as much overhead as the OSI layer. In this world, network engineers never make mistakes, such as using IPv4, which has been ...
1 vote
1 answer
182 views
Does bearssl contain AES-GCM implementation?
In BearSSL webpage it has been claimed that bearssl supports AES/GCM BearSSL currently implements AES/CBC, AES/GCM, AES/CCM and 3DES/CBC cipher suites. But I can not find any function in its GitHub ...
3 votes
1 answer
503 views
How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data
I'm working on a secure app that uses the user's master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was ...
1 vote
1 answer
355 views
How exactly does OpenGPG protect private keys?
Today it was time again to generate some new PGP key pairs that will be used for end-to-end-encrypted email. Now I'd like to know how exactly OpenPGP protects the private keys. What I have understood ...
1 vote
2 answers
185 views
How does the key distribution center (KDC) distribute the session key in symmetric ecryption?
When A communicates with B using third party KDC: A issues a request to the KDC for a session key; the message includes the identity of A and B and a nonce, N1. KDC responds with a message encrypted ...
1 vote
1 answer
641 views
Why does the Signal Protocol use a symmetric key for encryption- when asymmetric keys are more secure? [duplicate]
The Signal Protocol, as many of you would know, is used by many applications such as WhatsApp and Signal. These corporations, I can vouch for, would definitely use the most secure protocol they could- ...