( ~~~ )
  ))^ ^((
 ((* - *))
   _) (_
 / '--' \     ^
//(_  _)\\   /_\
\\ )__( //   .'
 (( v  ))   (
   \| /\     '-.
    K(  \       )
    |\\  '-._.-'
    ||\\
  *_-P/,P
     '-
Want your PHP application manually audited? Check out Xxor AB's PHP Security Auditing Service

Friday, July 29, 2011

Encrypt.se New Feature: Key exchange

Encrypt.se is a small tool that helps anyone to easily send encrypted messages. There is no registration, no cookies, no hassle.
Read more about it in this previous post: http://ha.xxor.se/2011/07/encryptse-beta-open-for-public.html

The Key Exchange feature enables users of Encrypt.se to communicate their secret crypto key to their friends over the phone, even if someone might be listening.

I've been working hard the last week to get this feature up and running. Currently there's only a PHP implementation, witch means that you will have to rely on our server to do some of the encryption and decryption. A JavaScript implementation is on its way.

How it works

To securely transmit a secret key over an insecure channel we utilize a well known method. This is how it works.

--------Sender--------           ------Recipient------

 (Step 1)
Input a secret key and
apply a first level of
encryption to the key.
Send the encrypted key            (Step 2)
to the recipient.      --------> The recipient applies
                                 a second level of
                                 encryption and
 (Step 3)                        transmits the double-
The sender now removes <-------- encrypted key back.
(decrypts) the first
level of encryption                       
and transfers the
encrypted key back to             (Step 4)
the recipient.         --------> The recipient can now 
                                 remove (decrypt) the
                                 second level of
                                 encryption and read
                                 the secret key.

--------Sender--------           ------Recipient------

Weakness

This method is of course susceptible to a MITM attack. But by using the phone or any other medium where other parts identity can be validated, for example by recognizing their voice, it is safe.

19 comments:

  1. It's an advanced feature. You can also modify it depending on the configuration.

    ReplyDelete
  2. Are you also searching for spanish nursing writing services we are the best solution for you. We are best known for delivering the best services to students.  

    ReplyDelete
  3. I've been working hard the last week to get this feature up and running. Currently there's only a PHP implementation, witch means that you will have to rely on our server to do some of the encryption and decryption. A JavaScript implementation is on its way. pandora necklace canada , pandora necklace australia

    ReplyDelete
  4. Thanks for sharing this.,
    Leanpitch provides online training in Scrum Master, everyone can use it wisely.
    Join Leanpitch 2 Days CSM Certification Workshop in different cities.
    scrum master certification cost

    csm certification cost

    ReplyDelete
  5. Excellent content ,Thanks for sharing this .,
    Leanpitch provides online training in CSPO, everyone can use it wisely.



    CSPO certification
    CSPO TRAINING

    ReplyDelete
  6. Leanpitch provides online training in Scrum Master, everyone can use it wisely.
    Join Leanpitch 2 Days CSM Certification Workshop in different cities.

    Scrum master certification
    csm certification

    ReplyDelete
  7. Goassignmenthelp is a team of leading professional writers for Assignment Help to students all around the world. Contact us today for the Best Assignment help melbourne at a very affordable price. Hire native seasoned experts real estate assignment help at very affordable prices. We are the most reliable Business Analytics Assignment Help assignment helpers. Visit - Assignment help

    ReplyDelete
  8. I appreciate the information on this web page. I gained a lot of knowledge about Encrypt key exchange

    ReplyDelete
  9. Thanks for sharing the information about this new feature of Encrypt.se. This will be a big help. Now repair your mobile in Baltimore from https://www.vfixphonesandtech.com/ check out for more information.

    ReplyDelete
  10. Really nice article. It's a very helpful and useful new feature of encrypting key exchange. Thank you for taking the to share with us. Now it's time to get Long distance taxi for more information.

    ReplyDelete
  11. Thank you for sharing this post! you done great effort, it is very useful for me
    Abogado DUI Rockbridge VA

    ReplyDelete
  12. "Wow, deck installations have truly become a game-changer for transforming outdoor spaces! As a senior content writer, I can't help but emphasize the significance of a well-designed deck when it comes to maximizing both the functionality and aesthetics of your home. Deck installations offer a multitude of benefits, ranging from providing a versatile area for entertaining guests to creating a peaceful retreat for relaxation. Whether you envision a cozy spot for family gatherings or an elegant space to host outdoor parties, a deck can cater to your specific needs and preferences.

    ReplyDelete
  13. In a time where information breaks and digital dangers pose a potential threat, defending delicate data has become vital for organizations and people the same. As innovation develops, so do the techniques utilized by vindictive entertainers to take advantage of weaknesses in frameworks. To address this developing concern, designers consistently enhance encryption procedures to invigorate information insurance measures. One such headway is the Scramble New Component on PHP Key Trade, which commitments elevated security for communicating classified information over networks. With regards to online protection challenges, this improvement proclaims a critical step forward in sustaining computerized guards.

    Grasping the Meaning of Encryption:

    Encryption fills in as the foundation of present day network safety, delivering information unintelligible to unapproved parties by changing over it into a mixed organization. This change happens using cryptographic calculations and keys, which encode the data into ciphertext that must be translated with the relating decoding key. By carrying out encryption conventions, associations can moderate the gamble of information breaks and unapproved access, guaranteeing the privacy and uprightness of touchy data.

    Presenting the Scramble New Component on PHP Key Trade:

    The Scramble New Component on PHP Key Trade addresses a state of the art headway in encryption innovation, explicitly customized for PHP applications. PHP, a famous prearranging language broadly utilized for web improvement, presently flaunts upgraded capacities in secure information transmission through this imaginative component. With this usefulness, engineers can consistently coordinate vigorous encryption conventions into their PHP applications, supporting their safeguards against potential digital dangers.

    Key Components of the Scramble New Element:

    Improved Key Trade Instrument: The Scramble New Component on PHP works with secure key trade between imparting parties, guaranteeing that encryption keys stay secret and safeguarded against capture by enemies. This component utilizes progressed cryptographic conventions to lay out a safe channel for communicating delicate information.

    Solid Encryption Calculations: Utilizing cutting edge encryption calculations, like AES (High level Encryption Standard) and RSA (Rivest-Shamir-Adleman), the Encode New Component guarantees hearty assurance for information very still and on the way. These calculations use complex numerical capabilities to scramble and decode data, impeding unapproved access endeavors actually.

    End:
    In an undeniably interconnected computerized scene, guaranteeing the classification and trustworthiness of delicate data is basic. The Encode New Component on PHP Key Trade addresses a critical headway in encryption innovation, enabling designers to reinforce the security of PHP applications and safeguard against developing digital dangers. As associations keep on focusing on information security and administrative consistence, the reception of vigorous encryption components will stay fundamental in protecting important resources and keeping up with partner trust. With the Encode New Element, organizations can embrace a proactive way to deal with network protection, strengthening their guards and encouraging a strong computerized biological system.

    Dissertation Help UK: For understudies undertaking research in the field of network safety or cryptography, investigating subjects, for example, the Encode New Component on PHP Key Trade can give significant bits of knowledge into arising advancements and their suggestions for information assurance. With master direction and backing from Dissertation Help UK administrations, understudies can explore complex subjects, lead top to bottom examination, and produce top notch dissertations that add to the progression of information in the field.

    ReplyDelete
  14. Montreal stars of the PWHL Marie-Philip Poulin and Laura Stacey have now become husband and wife . With this, the couple is taking the relationship to another level. They got engaged last summer, and their wedding could take place privately in the past weekend.

    ReplyDelete