You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I propose per packet encryption via session keys per packet when connecting to the server for the first time. The session key (a symmetric key) will be generated for both the client and server using a public key (an asymmetric key) using something like the Diffie–Hellman key exchange protocol.
After the session key is established per connection; we use the session key to encrypt outgoing client traffic and decrypt it at the server, and vice-versa because the client and server now share a secret key.
There are already a few crypto libraries for Rust such as Ring, and bindings to OpenSSL that could be used.
Of course, this is just an idea, and there might be a better way to go about encrypting network traffic.
The text was updated successfully, but these errors were encountered:
I propose per packet encryption via session keys per packet when connecting to the server for the first time. The session key (a symmetric key) will be generated for both the client and server using a public key (an asymmetric key) using something like the Diffie–Hellman key exchange protocol.
After the session key is established per connection; we use the session key to encrypt outgoing client traffic and decrypt it at the server, and vice-versa because the client and server now share a secret key.
There are already a few crypto libraries for Rust such as Ring, and bindings to OpenSSL that could be used.
Of course, this is just an idea, and there might be a better way to go about encrypting network traffic.
The text was updated successfully, but these errors were encountered: