Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] KeePassX



That depends on the cipher in use and if it supports perfect forward
secrecy or not.

http://en.wikipedia.org/wiki/Perfect_forward_secrecy
On 08/14/2013 06:34 AM, Jerry Feldman wrote:

> Agreed. But, breaking the session key only works for a single message or a
> single session. If they want to target a specific individual, breaking the
> RSA/DSA keys will give them access to all encrypted messages. (within the
> context is that a sent message is encrypted by the recipient's public key),
>

Yes, breaking the RSA/DSA key will let them read files or e-mails
(effectively a file) encrypted with that public key.  But I think that if
you are doing SSL with that public key, the key exchange cannot be
understood by a passive observer, so passively recording the packets will
not let someone later decrypt the exchange.


-kb

______________________________**_________________
Discuss mailing list
Discuss at blu.org
http://lists.blu.org/mailman/**listinfo/discuss<http://lists.blu.org/mailman/listinfo/discuss>



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org