Two parties pre-share a secret of a database of many AES keys, similar in style to a one-time pad. For each message, use a different key, a session key. The point is to guard against attacks against AES which require a lot of data to be sent with a key.
One new message per second consumes about 500 MB of keys per year.
No comments :
Post a Comment