Sorry, prematurely sent earlier. Sending it again ...

Hi,

I am a newbie to SSL as well as RSA security etc. However read quite a bit
of books and on the net.
But one thing flew over my head. Pl. see if anyone can help me understand
the following.

Suppose server and client used RSA based private/public key pairs. I
understood that
these would be used to authenticate each other.

Leaving DSA totally aside, considering only RSA alone, I did not fully
understand what
DH params are being used for in such communication. There is some
explanation
about DH params need in terms of key exchange etc, but did not follow what
this
key exchange does or means. Looked around quite a bit, but not found a
clear/direct answer.

The article at

http://support.microsoft.com/kb/257591

tries to explain somewhat but is at very high level and does not even
mention DH
params by name at all.

My vague understanding is that, though RSA based private/public key pair is
useful for authentication, but there still appears to be a need to generate
(symmetric ones ?)
some keys for encryption on a session by session basis. It appears that
either temporary RSA keys (not used it seems to due to some security
violations.
OK , fine) or DH params can be used. This is the thing went over my head.
I did not understand
    - why is there a need for generating session to session keys ?
      Guess, session needs to be encrypted.
      Why cann't we use the key pair we already have?
      Guess, to provide what I read as "forward secrecy". Fine
   - But how is DH params helping to create these session keys?
      Is this what is pre-master, master key thing referred in the
      http://support.microsoft.com/kb/257591 article.

Any explanation on how/what DH params doing in RSA based private/public
key based SSL connection would be greatly appreciated.

regards
jackie

PS: BTW, did not know how to look for responses. Is there a mail group
I go to check emails or do I get a email directly (hopefully :)

Reply via email to