Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Windows NT used a point-to-point protocol where a client can communicate \"secur

ID: 648013 • Letter: W

Question

Windows NT used a point-to-point protocol where a client can communicate "securely" with a server by using a stream cipher to encrypt an array of messages with some key k. The server also encrypts its response with the same key k. But how is it aware of this key?

More general: if Alice and Bob use some encryption/decryption algorithm that operates on the same private key k, what is a secure way of exchanging this key? (without using a different key ofcourse)

This is something that I've always asked myself whilest studying private key cryptography.

Explanation / Answer

Most private key algorithms rely on infeasibility of certain computations like factorisation of a number into its prime factors given the current computing infrastructure.

At the same time, most of them are also computationally intensive when used for encryption and decryption and therefore the entire message stream is not encrypted using the private keys. Rather, the message is encrypted using some other (less intensive) algorithm and the key used for that encryption is encrypted using the Private Key.

Of course, as you point out, secure exchange of keys remains an issue which can be to a certain extent be addressed by:

Diffie-Hellman Key Exchange: Uses modular arthimetic to securely exchange keys.
Single/Multiple Key Distribution Center (KDC): Uses trusted third party based ticketing system.
Kerberos Authentication Protocol: A relatively complex protocol based on KDC.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote