skerkour / kerkour.com

(Ab)using technology for fun & profit. Programming, Hacking & Entrepreneurship @ https://kerkour.com
https://kerkour.com
Apache License 2.0
463 stars 63 forks source link

Beaglebone and host #10

Closed kwsg97 closed 2 years ago

kwsg97 commented 2 years ago

I want to assign this between two parties Beagle bone black and my computer ! It works for that implementation?

sylvain101010 commented 2 years ago

Hello, Sorry I'm not sure to understand what you are talking about 😕

kwsg97 commented 2 years ago

For the diffie helman key exchange , i want to set up the key exchange end to end flow. I have my pc in linux and i have a beaglebone black connecting on ethernet with my pc. It is possible to use this keyexchange code for generate public and private keys and in the end generate a key secret ? . Finally i want to have a key exchange between two parties , two devices!

sylvain101010 commented 2 years ago

Ho I see

It depends of your threat model. But in this scenario, I think that it's way simpler to only use symmetric encryption to encrypt data between the devices and put the same secret key on both your computer and Beaglebone.

DH Key exchange is more useful when the two (or more) parties need to communicate without having the occasion to exchange keys physically.

At the end of the day, key exchange's role is to establish a shared symmetric encryption key, so if you can completely skip key exchange step, you may as well do it.