Robust keys generation for the highest security

Posted by Admin | 12 August, 2016 | Technical

On our childhood, who hasn’t played sending hidden or encoded messages with friends? The lemon juice was a good game. Writing what we wanted to share with lemon juice on a piece of paper and telling our mate the technique of heating it under a candle or lighter to discover was written was great fun.

Meeting the same purpose, Diffie-Hellman key exchange (D-H) developed a method that generate a private key which would be the “code” or the juice between two machines or players, connected through an insecure channel as the paper left wherever in the game.

The huge difference is that Diffie-Hellman deals with encrypted messages which would take several computer years to decrypt.

The hidden communication game was translated on a protocol which starts once a client begins a connection to a secured web service. Then, the public keys are exchanged once the SSL negotiation has occurred. As the classmate on the game described, the two parties comes into an agreement in regards to the keys and ciphers to be used during the communication.

In this illustration is perfectly explained how the negotiation behaves with colors.

blog post key

In regards to load balancing services, HTTPS or SSL, the strong key generation is crucial, but why is it important?
In this article we explain the reasons.

As any service provider, for us our customers trust it’s what matter the most, so that we have implemented Diffie-Hellman key exchange protocol as a good practice applied on all our products.

SHARE ON:

Related Blogs

Posted by reluser | 08 May 2024
The distinction between penetration testing and vulnerability scanning is often blurred. However, understanding their nuanced disparities is crucial for organizations to tailor their security strategies effectively. While both methodologies contribute…
24 LikesComments Off on Key differences between Pen Testing & Vulnerability Scanning
Posted by reluser | 22 March 2024
Load balancing is crucial for building reliable distributed systems, optimizing workload allocation across various computing resources like computers, clusters, and network links. Its aim is to enhance resource utilization, maximize…
68 LikesComments Off on Deep dive into Network Load Balancing and Proxying
Posted by reluser | 25 October 2023
In our current digital landscape, where websites and applications need to be available 24/7, load balancers play a crucial role in distributing traffic across multiple servers to ensure optimal performance…
46 LikesComments Off on The Pain Points of Load Balancers and How RELIANOID Solves Them