Many of us know that in TLS when we want to transfer some sensitive data, we do not encrypt it using public-key encryption. Instead, we use a symmetric key to encrypt the data. But why do we do so? If a TLS client encrypts the actual data, for example, by using the public key of the server and sends it to the server, will it be less secure?
Yes, it will be less secure if we do so. And, if we want to understand why it will be less secure, then we need to understand a concept called Perfect Forward Secrecy.
In this article, we will discuss:
-
What is Perfect Forward Secrecy?
-
How is Perfect Forward Secrecy implemented?
-
How is Perfect Forward Secrecy implemented in Diffie-Hellman Key Exchange Protocol?
-
What is Weak Perfect Forward Secrecy?
0 Comments