[52028] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Remailer passphrases

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Mar 12 15:07:06 1996

To: frantz@netcom.com (Bill Frantz)
Cc: cypherpunks@toad.com
In-Reply-To: Your message of "Tue, 12 Mar 1996 10:55:39 PST."
             <199603121853.KAA28808@netcom8.netcom.com> 
Reply-To: perry@piermont.com
Date: Tue, 12 Mar 1996 14:51:47 -0500
From: "Perry E. Metzger" <perry@piermont.com>


Bill Frantz writes:
> One of the reasons classical (government) crypto users change keys
> frequently is to minimize the amount of data compromised by a broken key. 
> We keep hearing about NSA decrypting 20 year old cyphertext and showing
> more of the workings of the atomic spy rings operating in the 40s and 50s. 
> If an opponent can rubber hose the key, her job is easy.  If she has to
> perform cryptoanalysis, it is much harder.  Remailers should regularly
> change their keys to avoid compromising previously recorded traffic.  (They
> can have a long lived key for signing their traffic keys.)

Signed Diffie-Hellman key exchanges have the property known as
"Perfect Forward Secrecy". Even if the opponent gets your public keys
it still will not decrypt any traffic for him at all -- it just lets
him pretend to be you. Thats one reason why protocols like Photuris
and Oakley use the technique.

Perry

home help back first fref pref prev next nref lref last post