Answer the question
In order to leave comments, you need to log in
Is it possible not to transfer the password to the server, but to encrypt the connection with it (for example, via sockets)?
Why are there no web applications that use something like this security scheme:
p is a password, F (p) is a higher order function that takes a password as input and returns a function that encrypts (synchronous encryption) text using a password, like
function getEncoder(password){
return function(message){ return encode(message, hash(password)); }
}
Answer the question
In order to leave comments, you need to log in
TLS works like this .
The problem is, the truth is that the key must somehow be transmitted to the server for the first time, and this requires asymmetric encryption.
In your scheme, it is provided that both parties already own one common key to communicate with each other. In this case, your scheme will work, since it will be a normal encryption with any block cipher.
The difficulty is precisely in distributing the keys between the two parties, so that no one can intercept and / or forge them.
In general, public ssh keys installed on web servers just solve this problem only from the reverse side. They give the client a password to send messages to the server, which cannot be quietly forged.
I believe that a person is looking for the ability to securely exchange data with a trusted source through untrusted (Internet) transports
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question