pgpfan:forward_secrecy
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| pgpfan:forward_secrecy [2022/01/06 21:04] – Another victim of the rewrite. b.walzer | pgpfan:forward_secrecy [2025/11/04 12:17] (current) – Entirely new argument. b.walzer | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | ||
| - | * After any attempts | + | * Optionally the adversary can attempt |
| - | * They then attack the place this secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. | + | * They then attack the place the secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. |
| So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. | So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. | ||
| Line 16: | Line 16: | ||
| Reduced to the essence: forward secrecy is where you delete the encryption key protecting some encrypted data to prevent that key from falling into the possession of an attacker that already has that encrypted data. There is nothing preventing any system from doing that, even something based on the OpenPGP standard. For a practical demonstration see: [[pgpfan: | Reduced to the essence: forward secrecy is where you delete the encryption key protecting some encrypted data to prevent that key from falling into the possession of an attacker that already has that encrypted data. There is nothing preventing any system from doing that, even something based on the OpenPGP standard. For a practical demonstration see: [[pgpfan: | ||
| + | |||
| + | Forward secrecy when applied to encrypted messaging often leads to less local security after the message is received. When a PGP message is received, it stays encrypted. It is only decrypted when the user wants to see it and the decrypted message is forgotten immediately after that. I have dubbed this feature: [[pgpfan: | ||
| Hardly anyone ever does forward secrecy with OpenPGP. Why not? It's easy to do in a technical sense and would not cause your correspondents to have to reverify your identity. | Hardly anyone ever does forward secrecy with OpenPGP. Why not? It's easy to do in a technical sense and would not cause your correspondents to have to reverify your identity. | ||
pgpfan/forward_secrecy.1641503057.txt.gz · Last modified: by b.walzer
