Sending an Encrypted Session Key
The easiest way to send encrypted messages to another user is to send the message (encrypted with a random session key) along with the session key (encrypted with the receiver's exchange public key). These are the steps for sending an encrypted session key:
1.Create a random session key using the CryptGenKey function.
2.Encrypt the message using the session key. (This procedure is discussed in the section Encrypting and Decrypting Data.)
3.Export the session key into a key blob with the CryptExportKey function, specifying that the key be encrypted with the destination user's key exchange public key.
4.Send both the encrypted message and the encrypted key blob to the destination user.
5.The destination user should then import the key blob into his or her CSP using the CryptImportKey function. This will automatically decrypt the session key, provided the destination user's key exchange public key was specified in step 3.
6.The destination user can then decrypt the message using the session key, following the procedure discussed in the section Encrypting and Decrypting Data.
The following illustration shows how to send an encrypted message using this procedure:
This approach is vulnerable to at least one common form of attack. An eavesdropper can acquire copies of one of more encrypted messages and the encrypted keys. Then, at some later time, the eavesdropper can send one of these messages to the receiver and the receiver will have no way of knowing the message did not come directly from the original sender. This risk can be reduced by timestamping all messages or by using serial numbers. Using a three-phase key exchange protocol will eliminate this problem entirely. See the Sample Three-Phase Exchange Protocol section.