top | item 36389291

(no title)

wahahah | 2 years ago

Being able to crack present-day communications in the future is still a concern.

discuss

order

its-summertime|2 years ago

Hence https://en.wikipedia.org/wiki/Forward_secrecy to make things more difficult

Compromising the main keys isn't enough, need to compromise each session key as well in turn, a massive increase.

upofadown|2 years ago

Forward secrecy does not provide any value against cryptography compromise. Quite the opposite as it depends on the security of the cryptography over the long term to insure old messages stay inaccessible after the key is forgotten.

Forward secrecy addresses this specific attack:

* Someone builds a archive of your encrypted messages, possibly without your knowledge or consent.

* That someone then gets access to your secret key material.

* They can then decrypt their archive.

The session keys are exchanged by the asymmetrical systems that the imagined quantum computer would be able to break. So the attacker gets the session keys directly. So for, say, signal, they only have to break a new key exchange which doesn't happen all that often. They can just run the hash ratchet after that. Even for TLS that does a new session key per connection, that connection might last a fair time. The 10 min can be spread over multiple connections for this proposal. We are hardly talking about a massive increase of difficulty.

lyu07282|2 years ago

I'd imagine that's exactly why the NSA hoards the (rumored) absurd amount of data in the Utah data center