We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
请问密钥加密交换的流程,用后端公钥加密客户端公钥这步有些不明白它的用意,客户端生成公钥私钥后,直接将公钥发送给后端,后端用客户端公钥加密交换密钥返回,然后客户端用私钥解密,这样走是不是更容易一些
The text was updated successfully, but these errors were encountered:
密钥交换加解密是TLS协议的动态实现,HTTPS的证书是静态的,而使用密钥交换加解密,全局过程中的密钥都是随机的。
步骤2.1的作用正是为了在传输过程中,不泄露最终交换的密钥
Sorry, something went wrong.
是的,复杂了。可以简化流程,感谢你的指出。我梳理了多一个交换步骤,能隐藏客户端公钥和增大劫持成本,但意义不大。后续我考虑优化下,简化流程降低使用成本。 至于当初这样设计的意义,我理不清了,应该就是设计缺陷,搞复杂了,也可能是受SSL/TLS协议影响,应用层是做不到防劫持的。
优化后流程:
感谢回复
yl-yue
No branches or pull requests
请问密钥加密交换的流程,用后端公钥加密客户端公钥这步有些不明白它的用意,客户端生成公钥私钥后,直接将公钥发送给后端,后端用客户端公钥加密交换密钥返回,然后客户端用私钥解密,这样走是不是更容易一些
The text was updated successfully, but these errors were encountered: