F5F Stay Refreshed Power Users Networks Secure communication via symmetric algorithms

Secure communication via symmetric algorithms

Secure communication via symmetric algorithms

B
blehhh
Member
50
04-08-2021, 03:04 PM
#1
Hello everyone. Please consider this a query about SSH symmetric encryption. The main idea is that symmetric keys encrypt all communication during an SSH session. Both the client and server generate the secret key together using a shared method, and neither party ever reveals the key to anyone else. This key generation happens through a key exchange algorithm. What makes it secure is that the key never travels between the client and the server—it’s exchanged via public data, which both computers share and use to compute the key independently. Even if someone intercepts this shared information, they can’t derive the key because the algorithm remains secret.

The statement clarifies that if a sniffer captures the public data, it could still reconstruct the key since the algorithm isn’t exposed. Encryption keys are set before any connection, and the same applies to the key exchange process. Communication happens over a simple medium like the internet, so the agreement on encryption methods is also sent through that channel. Even before a connection is made, both sides attempt to agree on the key exchange method.

So, if I understand correctly, a sniffer with access to public data and the encryption method could potentially create the symmetric key and decrypt intercepted packets. Is this accurate? Thank you!
B
blehhh
04-08-2021, 03:04 PM #1

Hello everyone. Please consider this a query about SSH symmetric encryption. The main idea is that symmetric keys encrypt all communication during an SSH session. Both the client and server generate the secret key together using a shared method, and neither party ever reveals the key to anyone else. This key generation happens through a key exchange algorithm. What makes it secure is that the key never travels between the client and the server—it’s exchanged via public data, which both computers share and use to compute the key independently. Even if someone intercepts this shared information, they can’t derive the key because the algorithm remains secret.

The statement clarifies that if a sniffer captures the public data, it could still reconstruct the key since the algorithm isn’t exposed. Encryption keys are set before any connection, and the same applies to the key exchange process. Communication happens over a simple medium like the internet, so the agreement on encryption methods is also sent through that channel. Even before a connection is made, both sides attempt to agree on the key exchange method.

So, if I understand correctly, a sniffer with access to public data and the encryption method could potentially create the symmetric key and decrypt intercepted packets. Is this accurate? Thank you!

N
NorthwestSun
Member
202
04-10-2021, 06:45 AM
#2
In theory, it seems possible, though there might be measures in place to stop it, such as altering the algorithm once the connection is set up—using one for connection and another for sending data. But I’m not an expert.
N
NorthwestSun
04-10-2021, 06:45 AM #2

In theory, it seems possible, though there might be measures in place to stop it, such as altering the algorithm once the connection is set up—using one for connection and another for sending data. But I’m not an expert.

O
Oma_
Member
68
04-11-2021, 09:27 AM
#3
Thanks!
O
Oma_
04-11-2021, 09:27 AM #3

Thanks!