Question about encryption attack vectors

Discussion in 'encryption problems' started by RockLobster, Apr 24, 2015.

  1. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    Not really knowing too much about how modern encryption algorithms work, I had always assumed if an attacker has a copy of some encrypted data and also a copy of that same data decrypted, he could figure out the encryption key used to encrypt it, is this not correct ?
     
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    With most common encryption methods, an adversary would need more than one example. Or a large example. But on the other hand, one-time pads, otherwise virtually unbreakable, are totally blown by one such example.
     
  3. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    I was wondering about this because when you submit a post to a site such as this one using https, is the same encryption key used as the one that was used for loading the page ? Or is a new key negotiated ? I also wondered is a new key negotiated as we view different pages on the site or is the same key used for all pages on the same server ?
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.