Answer the question
In order to leave comments, you need to log in
Passing keys inside a TLS connection?
Hello everybody.
Purpose: to make a secure UDP connection.
In order not to write handshakes and code for transferring encryption keys (symmetric), it was decided to:
1. establish a connection via the TLS protocol; 2. exchange keys inside it; 3.break TLS connection; 4. exchange data over an already secure UDP connection using previously obtained keys.
As advantages of this approach: an already tested and stable working protocol is used, therefore the number of code where there may be a bug is reduced.
Question: what disadvantages can such a solution entail? (except for the lack of customization of the handshake moment and the key exchange embedded in TLS)
PS: by the way, in my opinion, httpsalso first uses a slow asymmetric encryption algorithm to exchange symmetric keys inside it (since asymmetric encryption is much slower than symmetric encryption, it is better to use symmetric encryption)
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question