Skip to content

v0.4.5-rc1

Pre-release
Pre-release
Compare
Choose a tag to compare
@zaibon zaibon released this 26 Oct 16:33
do hash the shared secret generated to decrypt workloads sensitive

information

Extract from
https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman#Key_establishment_protocol:
While the shared secret may be used directly as a key, it can be desirable to hash the secret to remove weak bits due to the Diffie–Hellman exchange.