O
O
Octet2022-01-19 23:52:34
Encryption
Octet, 2022-01-19 23:52:34

How is it theoretically possible to set up an encrypted channel?

Suppose that in my country some Internet resource is blocked, that is, the request to the provider to provide content at the given address is not transmitted by the provider. Moreover, if I connect to some Tor, then a connection will occur between me and the proxy servers, in which, as far as I know, we will exchange keys to decrypt the traffic that is transmitted from there to here.

Question: if the key has not yet been transferred, then during the initial key exchange, our traffic is not yet protected from the provider (including, as I understand it, the transmitted keys), that is, the keys are visible to the provider during our initial interaction and it can potentially use them for traffic decryption?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
A
Armenian Radio, 2022-01-20
@Octet

If the remote resource works via HTTPS, it does not matter at all how many compromised proxies are on the way from you to the node - HTTPS guarantees protection from MitM, provided that you do not do stupid things (do not install left-handed certificates and check the certificates of the sites you work with for validity All kinds of
bad things can happen with HTTP, but what sane resource in the 2020s is using HTTP?

N
nApoBo3, 2022-01-20
@nApoBo3

It doesn't quite work that way. With symmetric encryption, yes, you must exchange keys through a trusted medium. With non-symmetric encryption, there is a public key and a private key, one of them encrypts the data, the other decrypts. For example, you publish the encryption key, anyone can encrypt the data, but only you can decrypt it back. If I give you an encryption key through open channels, then you can be sure that only the person who gave you this key can decrypt your message (while maintaining the secret of the private key).
A mitm attack can be implemented here, when the key is not passed to you by the final recipient, but by an intermediate one. For such cases, a trusted third party is introduced, the trust of which is established "preliminarily".

C
CityCat4, 2022-01-20
@CityCat4

that is, the keys are visible to the provider during our initial interaction

No.
Google "asymmetric cryptography". It is just invented to establish a connection over a listening channel. At the moment, it is impossible to break https directly, which is why all sorts of tricks are used with the installation of state certificates :)
But with the torus, the example is unsuccessful - in itself, using the torus already marks you as a person worth following...

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question