Friday, August 09, 2013

[jjbbbolo] One time key

Two parties pre-share a secret of a database of many AES keys, similar in style to a one-time pad.  For each message, use a different key, a session key.  The point is to guard against attacks against AES which require a lot of data to be sent with a key.

One new message per second consumes about 500 MB of keys per year.

No comments :