Robust keys generation for the highest security

Posted by Zevenet | 12 August, 2016 | Technical

On our childhood, who hasn’t played sending hidden or encoded messages with friends? The lemon juice was a good game. Writing what we wanted to share with lemon juice on a piece of paper and telling our mate the technique of heating it under a candle or lighter to discover was written was great fun.

Meeting the same purpose, Diffie-Hellman key exchange (D-H) developed a method that generate a private key which would be the “code” or the juice between two machines or players, connected through an insecure channel as the paper left wherever in the game.

The huge difference is that Diffie-Hellman deals with encrypted messages which would take several computer years to decrypt.

The hidden communication game was translated on a protocol which starts once a client begins a connection to a secured web service. Then, the public keys are exchanged once the SSL negotiation has occurred. As the classmate on the game described, the two parties comes into an agreement in regards to the keys and ciphers to be used during the communication.

In this illustration is perfectly explained how the negotiation behaves with colors.

blog post key

In regards to load balancing services, HTTPS or SSL, the strong key generation is crucial, but why is it important?
In this article we explain the reasons.

As any service provider, for us our customers trust it’s what matter the most, so that we have implemented Diffie-Hellman key exchange protocol as a good practice applied on all our products.

SHARE ON:

Related Blogs

Posted by zenweb | 16 April 2021
ZEVENET is a smart company focused on the Application Delivery Controller market and really obsessed with the security in the delivery, for that reason we really know that today the…
4 LikesComments Off on ZEVENET Multi-Layered Security Overview in the Edge
Posted by zenweb | 23 March 2021
The world of the internet is full of people waiting to breach into your system. They want to get a grasp of your personal information and exploit it. This might…
13 LikesComments Off on Importance of Cybersecurity for Businesses
Posted by zenweb | 18 March 2021
Even though it has been only a few months since the already famous attack on the SolarWinds supply chain, again we have to write about another hacking issue, this time…
15 LikesComments Off on Mitigation for Exchange Servers Hafnium Zero-day vulnerabilities