Brute Force Breaking of Encryption – Solution Scheme
- Why do we need certificates at all in PKI?
- Diffie Helman, Symmetric and Asymmetric Encryption
- Group Encryption Keys
- Brute Force Breaking of Encryption – Solution Scheme
- Encryption and Signing – Same Key Pair – or different key pairs?
- Tokenization versus Encryption vs Data Masking
One of the more interesting approaches to preventing brute force cracking is to actually use MULTIPLE private keys that all map to the SAME public key.
Now, only ONE of these keys is assigned to our user (Alice). What the assignment process is – is not too relevant. All Alice knows is that she has a key pair – and her private key is possibly one of many.
A hacker can now listen in and see the encrypted data and reverse engineer this encrypted data to retrieve the private key (a computationally difficult task).
Let us say the hacker is successful in doing so. All the hacker has done is retrieve A private key – not THE private key (since all those private keys map to the same public key!)
Also read – Different key pairs for signature and encryption and Group Encryption Keys
Leave a Reply