pgpfan:forward_secrecy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
pgpfan:forward_secrecy [2022/01/06 21:04] – Another victim of the rewrite. b.walzer | pgpfan:forward_secrecy [2022/03/19 21:50] (current) – Redundant, poorly worded. b.walzer | ||
---|---|---|---|
Line 4: | Line 4: | ||
* Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | ||
- | * After any attempts | + | * Optionally the adversary can attempt |
- | * They then attack the place this secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. | + | * They then attack the place the secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. |
So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. | So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. |
pgpfan/forward_secrecy.txt · Last modified: 2022/03/19 21:50 by b.walzer