Why do we modify passwords for a key, in implementation?

Best practice, when implementing an encryption algorithm, is to hash the password creatively, for use as a key.

Under the accident that our key becomes compromised during its life cycle, the attacker can theoretically read other messages enciphered with the same password.

We hash the password, so that a compromised key does not enable the attacker to impersonate Bob or Alice using the actual password, and interfere more seriously.

When we change the password, intermediate messages might remain compromised, but new messages may still be secure, as long as passwords remain confidential.

Advertisements

About James Johnson

I am an amateur mathematician & political theorist who enjoys (occasionally cerebral) humor.
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s