• @JeeBaiChow@lemmy.world
    link
    fedilink
    English
    84 months ago

    When chipped keys launched, wasn’t there a lot of talk about how the system would negotiate a new set of keys for the next interaction making the simple act of recording radio exchanges impossible? All hot air by the manufacturers?

      • gian
        link
        fedilink
        English
        94 months ago

        The first rule of encryption is that the password need to be secret, not the algorithm. (not mine, but I cannot readily find the source, sorry :-( )

        A truly good encryption algorithm is safe even if I give you the source code for it but not the password I used to encrypt the data.

        • @fuckwit_mcbumcrumble@lemmy.world
          link
          fedilink
          English
          -24 months ago

          That’s assuming the algorithm is sound. If the algorithm has a flaw then it’s only a matter of time until you can easily crack anything using it.

        • @modeler@lemmy.world
          link
          fedilink
          English
          44 months ago

          Exactly. And all the core internet encryption and signing algorithms are fully open source. Eg RSA, AES, DIffie Helman. And these are the algorithms the US (and most other western) governments require when sending data to or from or within there servers.