Post History
No, the scheme described doesn't make sense, regardless if it is digital or analog. Anybody can intercept the public key and decrypt so the scheme doesn't protect against eavesdroppers. The entiti...
Answer
#2: Post edited
- No, the scheme described doesn't make sense, regardless if it is digital or analog.
Anybody can intercept the public key and decrypt so the scheme doesn't protect against eavesdroppers. To get a two side authenticated connection the system needs a key pair for which the public key is trusted by the other party.- That way an entity can authenticate itself. As long as that's possible then there are multiple ways of establishing a shared secret.
- If you're looking for generic ways of applying analogue encryption you can have a look [at this Q/A on Cryptography.SE](https://crypto.stackexchange.com/a/15015/1172).
- No, the scheme described doesn't make sense, regardless if it is digital or analog.
- Anybody can intercept the public key and decrypt so the scheme doesn't protect against eavesdroppers. The entities are not authenticated either, so active attacks are also possible. To get a two side authenticated connection the system needs a key pair for which the public key is trusted by the other party.
- That way an entity can authenticate itself. As long as that's possible then there are multiple ways of establishing a shared secret.
- If you're looking for generic ways of applying analogue encryption you can have a look [at this Q/A on Cryptography.SE](https://crypto.stackexchange.com/a/15015/1172).
#1: Initial revision
No, the scheme described doesn't make sense, regardless if it is digital or analog. Anybody can intercept the public key and decrypt so the scheme doesn't protect against eavesdroppers. To get a two side authenticated connection the system needs a key pair for which the public key is trusted by the other party. That way an entity can authenticate itself. As long as that's possible then there are multiple ways of establishing a shared secret. If you're looking for generic ways of applying analogue encryption you can have a look [at this Q/A on Cryptography.SE](https://crypto.stackexchange.com/a/15015/1172).