Reply to post: Re: What?

'Independent' gov law reviewer wants users preemptively identified before they're 'allowed' to use encryption

trusttone

Re: What?

Think DH key exchange on TLS (ECDHE is too advanced). Once the identity of both parties are verified, the DH key exchange is done (simplifying TLS). If one of the identities is unknown, DH is not performed and data is sent in clear. One can have TLS auth without encryption.

The problem is one can run DH variations on the top of it and still get encrypted communications.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon