Sample Three-Phase Exchange Protocol

To generate an authenticated and encrypted connection between two parties on a nonsecure network, the parties can exchange a set of messages that negotiate a pair of encryption keys. One key is used by the "sender" to encrypt messages and the other is used by the "receiver." This protocol ensures that both parties are currently active and are sending messages directly to each other. In other words, this protocol prevents "replay" and "man-in-the-middle" attacks.

Note This section assumes that both parties involved already possess their own set of public/private key pairs and that they have also obtained each other's public keys.

It is further assumed that the parties have already exchanged human-readable user names. This is generally done at the same time the public keys are exchanged, since the user name is included as part of each certificate. When necessary, the public key data can be used as the user name, although this is not recommended. All that really matters, though, is that each party's user name be tightly bound to their public key and that both parties agree on what their respective user names are.

Software for developers
Delphi Components
.Net Components
Software for Android Developers
More information resources
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
Databases for Amazon shops developers
Amazon Categories Database
Browse Nodes Database