The Call of the Open Sidewalk

From a place slightly to the side of the more popular path

User Tools

Site Tools


pgpfan:forward_secrecy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
pgpfan:forward_secrecy [2022/01/06 21:04] – Another victim of the rewrite. b.walzerpgpfan:forward_secrecy [2022/03/19 21:50] (current) – Redundant, poorly worded. b.walzer
Line 4: Line 4:
  
   * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent.   * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent.
-  * After any attempts to break the encryption fail they then attempt to get access to the secret key information used to encrypt the messages in the first place+  * Optionally the adversary can attempt to break the encryption on your messages. If they are successful then forward secrecy provides no value
-  * They then attack the place this secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages.+  * They then attack the place the secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages.
  
 So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning.
pgpfan/forward_secrecy.1641503057.txt.gz · Last modified: 2022/01/06 21:04 by b.walzer