Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. In an E2EE system, how does Alice know what Bob's public key is?

In an E2EE system, how does Alice know what Bob's public key is?

Scheduled Pinned Locked Moved Uncategorized
cryptography
5 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ghosttie@mastodon.gamedev.placeG This user is from outside of this forum
    ghosttie@mastodon.gamedev.placeG This user is from outside of this forum
    ghosttie@mastodon.gamedev.place
    wrote last edited by
    #1

    In an E2EE system, how does Alice know what Bob's public key is?

    #cryptography

    dacmot@sunny.gardenD 1 Reply Last reply
    0
    • ghosttie@mastodon.gamedev.placeG ghosttie@mastodon.gamedev.place

      In an E2EE system, how does Alice know what Bob's public key is?

      #cryptography

      dacmot@sunny.gardenD This user is from outside of this forum
      dacmot@sunny.gardenD This user is from outside of this forum
      dacmot@sunny.garden
      wrote last edited by
      #2

      @ghosttie it's public, so either Bob can send it to Alice, or if it's part of a system like Signal, then the public key is part (maybe hidden /abstracted) of the user profile data.

      ghosttie@mastodon.gamedev.placeG 1 Reply Last reply
      0
      • dacmot@sunny.gardenD dacmot@sunny.garden

        @ghosttie it's public, so either Bob can send it to Alice, or if it's part of a system like Signal, then the public key is part (maybe hidden /abstracted) of the user profile data.

        ghosttie@mastodon.gamedev.placeG This user is from outside of this forum
        ghosttie@mastodon.gamedev.placeG This user is from outside of this forum
        ghosttie@mastodon.gamedev.place
        wrote last edited by
        #3

        @dacmot how does Alice know that's Bob's actual public key and not Mallory's?

        dacmot@sunny.gardenD zoarial94@infosec.exchangeZ 2 Replies Last reply
        0
        • ghosttie@mastodon.gamedev.placeG ghosttie@mastodon.gamedev.place

          @dacmot how does Alice know that's Bob's actual public key and not Mallory's?

          dacmot@sunny.gardenD This user is from outside of this forum
          dacmot@sunny.gardenD This user is from outside of this forum
          dacmot@sunny.garden
          wrote last edited by
          #4

          @ghosttie one way would be to meet in person.

          In a system like Signal, it would be built in to the user ID. For things like PGP/GPG, websites, or developer signing key, there are multiple mechanisms to verify the key identity. You can use a web of trust (WOT) or keyrings, certificate authorities like DigiCert/Let's Encrypt, or MS/Google/Apple issuing signing keys.

          Note that none of those methods are perfect, and a bad actor could still manage to impersonate someone else. But it makes it significantly harder.

          1 Reply Last reply
          0
          • ghosttie@mastodon.gamedev.placeG ghosttie@mastodon.gamedev.place

            @dacmot how does Alice know that's Bob's actual public key and not Mallory's?

            zoarial94@infosec.exchangeZ This user is from outside of this forum
            zoarial94@infosec.exchangeZ This user is from outside of this forum
            zoarial94@infosec.exchange
            wrote last edited by
            #5

            @ghosttie @dacmot I think you need a second communication channel. And something to corroborate that multiple channels are controlled by the same person. The most surefire way is to meet in person and confirm the keys. I don't think there's a purely technical way to solve this without putting trust into some central authority. It's inherently a social problem.

            1 Reply Last reply
            1
            0
            • R relay@relay.infosec.exchange shared this topic
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups