HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 34

Publicly Exchanging a Secret

Page 34 highlights

Figure 26 - Publicly Exchanging a Secret Here the Blue PC puts a secret in a box and locks it with the blue lock, then drops the box in the "mail" so to speak and the Green PC receives it. The Green PC puts on a green lock and drops the box back in the mail. The Blue PC removes the blue lock and drops the box back into the mail. The green PC receives it and can now simply remove its green lock and has access to the secret. Think of the Diffie-Hellman group number as the "strength of the locks" used to protect the secret. As an example, DH-Group 2 is "stronger" than DH-Group 1. Both sides need to agree on the strength of the lock before engaging in a DH exchange. That is why the DH group number is part of the proposal 34

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

34
Figure 26 – Publicly Exchanging a Secret
Here the Blue PC puts a secret in a box and locks it with the blue lock, then drops the box in the
“mail” so to speak and the Green PC receives it. The Green PC puts on a green lock and drops the
box back in the mail.
The Blue PC removes the blue lock and drops the box back into the mail.
The
green PC receives it and can now simply remove its green lock and has access to the secret.
Think of
the Diffie-Hellman group number as the “strength of the locks” used to protect the secret.
As an
example, DH-Group 2 is “stronger” than DH-Group 1.
Both sides need to agree on the strength of
the lock before engaging in a DH exchange.
That is why the DH group number is part of the
proposal