( ~~~ )
  ))^ ^((
 ((* - *))
   _) (_
 / '--' \     ^
//(_  _)\\   /_\
\\ )__( //   .'
 (( v  ))   (
   \| /\     '-.
    K(  \       )
    |\\  '-._.-'
    ||\\
  *_-P/,P
     '-
Want your PHP application manually audited? Check out Xxor AB's PHP Security Auditing Service

Friday, July 29, 2011

Encrypt.se New Feature: Key exchange

Encrypt.se is a small tool that helps anyone to easily send encrypted messages. There is no registration, no cookies, no hassle.
Read more about it in this previous post: http://ha.xxor.se/2011/07/encryptse-beta-open-for-public.html

The Key Exchange feature enables users of Encrypt.se to communicate their secret crypto key to their friends over the phone, even if someone might be listening.

I've been working hard the last week to get this feature up and running. Currently there's only a PHP implementation, witch means that you will have to rely on our server to do some of the encryption and decryption. A JavaScript implementation is on its way.

How it works

To securely transmit a secret key over an insecure channel we utilize a well known method. This is how it works.

--------Sender--------           ------Recipient------

 (Step 1)
Input a secret key and
apply a first level of
encryption to the key.
Send the encrypted key            (Step 2)
to the recipient.      --------> The recipient applies
                                 a second level of
                                 encryption and
 (Step 3)                        transmits the double-
The sender now removes <-------- encrypted key back.
(decrypts) the first
level of encryption                       
and transfers the
encrypted key back to             (Step 4)
the recipient.         --------> The recipient can now 
                                 remove (decrypt) the
                                 second level of
                                 encryption and read
                                 the secret key.

--------Sender--------           ------Recipient------

Weakness

This method is of course susceptible to a MITM attack. But by using the phone or any other medium where other parts identity can be validated, for example by recognizing their voice, it is safe.

21 comments:

  1. It's an advanced feature. You can also modify it depending on the configuration.

    ReplyDelete
  2. Are you also searching for spanish nursing writing services we are the best solution for you. We are best known for delivering the best services to students.  

    ReplyDelete
  3. I've been working hard the last week to get this feature up and running. Currently there's only a PHP implementation, witch means that you will have to rely on our server to do some of the encryption and decryption. A JavaScript implementation is on its way. pandora necklace canada , pandora necklace australia

    ReplyDelete
  4. Thanks for sharing this.,
    Leanpitch provides online training in Scrum Master, everyone can use it wisely.
    Join Leanpitch 2 Days CSM Certification Workshop in different cities.
    csm training
    Scrum master Training

    ReplyDelete
  5. Thanks for sharing this.,
    Leanpitch provides online training in Scrum Master, everyone can use it wisely.
    Join Leanpitch 2 Days CSM Certification Workshop in different cities.
    scrum master certification cost

    csm certification cost

    ReplyDelete
  6. Excellent content ,Thanks for sharing this .,
    Leanpitch provides online training in CSPO, everyone can use it wisely.



    CSPO certification
    CSPO TRAINING

    ReplyDelete
  7. Leanpitch provides online training in Scrum Master, everyone can use it wisely.
    Join Leanpitch 2 Days CSM Certification Workshop in different cities.

    Scrum master certification
    csm certification

    ReplyDelete
  8. Excellent content ,Thanks for sharing this .,
    Leanpitch provides online training in ICP ACC, everyone can use it wisely.
    ICP ACC certification
    Certified Agile coach

    ReplyDelete
  9. Goassignmenthelp is a team of leading professional writers for Assignment Help to students all around the world. Contact us today for the Best Assignment help melbourne at a very affordable price. Hire native seasoned experts real estate assignment help at very affordable prices. We are the most reliable Business Analytics Assignment Help assignment helpers. Visit - Assignment help

    ReplyDelete
  10. I appreciate the information on this web page. I gained a lot of knowledge about Encrypt key exchange

    ReplyDelete
  11. Thanks for sharing the information about this new feature of Encrypt.se. This will be a big help. Now repair your mobile in Baltimore from https://www.vfixphonesandtech.com/ check out for more information.

    ReplyDelete
  12. Really nice article. It's a very helpful and useful new feature of encrypting key exchange. Thank you for taking the to share with us. Now it's time to get Long distance taxi for more information.

    ReplyDelete
  13. Thank you for sharing this post! you done great effort, it is very useful for me
    Abogado DUI Rockbridge VA

    ReplyDelete
  14. "Wow, deck installations have truly become a game-changer for transforming outdoor spaces! As a senior content writer, I can't help but emphasize the significance of a well-designed deck when it comes to maximizing both the functionality and aesthetics of your home. Deck installations offer a multitude of benefits, ranging from providing a versatile area for entertaining guests to creating a peaceful retreat for relaxation. Whether you envision a cozy spot for family gatherings or an elegant space to host outdoor parties, a deck can cater to your specific needs and preferences.

    ReplyDelete