Robust keys generation for the highest security

Posted by Zevenet | 12 August, 2016 | Technical

On our childhood, who hasn’t played sending hidden or encoded messages with friends? The lemon juice was a good game. Writing what we wanted to share with lemon juice on a piece of paper and telling our mate the technique of heating it under a candle or lighter to discover was written was great fun.

Meeting the same purpose, Diffie-Hellman key exchange (D-H) developed a method that generate a private key which would be the “code” or the juice between two machines or players, connected through an insecure channel as the paper left wherever in the game.

The huge difference is that Diffie-Hellman deals with encrypted messages which would take several computer years to decrypt.

The hidden communication game was translated on a protocol which starts once a client begins a connection to a secured web service. Then, the public keys are exchanged once the SSL negotiation has occurred. As the classmate on the game described, the two parties comes into an agreement in regards to the keys and ciphers to be used during the communication.

In this illustration is perfectly explained how the negotiation behaves with colors.

blog post key

In regards to load balancing services, HTTPS or SSL, the strong key generation is crucial, but why is it important?
In this article we explain the reasons.

As any service provider, for us our customers trust it’s what matter the most, so that we have implemented Diffie-Hellman key exchange protocol as a good practice applied on all our products.

SHARE ON:

Related Blogs

Posted by zenweb | 20 July 2022
A network operations center (NOC) is a central location where IT teams in an organization monitor the performance of a network. The NOC provides servers, databases, hard disk space, and…
18 LikesComments Off on Network Operations Center, Definition and Top 4 Best Practices
Posted by zenweb | 11 July 2022
Introduction The process of achieving and maintaining PCI DSS Compliance is not easy for any organization. Be it a large-scale organization, mid-sized firm, or a small company, PCI DSS can…
16 LikesComments Off on What Preparations are required for PCI DSS Compliance?
Posted by zenweb | 04 July 2022
Cyber Security has evolved very quickly over the years, from an IT issue to an issue to be used in businesses. It has been demonstrated that Cyber attacks can be…
13 LikesComments Off on 5 Benefits of Investing in Cyber Security & IT solutions in 2022