-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
Matej Kovacic wrote:
> OK, the problem is what if authority force you to reveal the keys?
>
> I am sure you all know this:
>
> http://www.cypherpunks.ca/otr/Protocol-v2-3.0.0.html
> Perfect forward secrecy
> If you lose control of your private keys, no previous conversation
> is compromised.
>
> Why not to add aditional feature: to generate keys each time Tor is
> started (or even for each "conversation")?
>
> Then you have perfect forward secrecy AND also future secrecy (except an
> attacker steals key for each "conversation" at the beginning of it). And
> if keys are not stored anywhere, you can't give them.
>
>
> Or this has already been discussed and I am missing something?
> bye, Matej
Problem is that key generation with adequate entropy levels is time and
processor intensive. It all depends on how big your keys are tho. I use
a 4096 bit pgp key and it often takes up to 5 minutes to generate a new
key. With a hardware RNG it's not so bad, but with a software one you
are dependent on stochastic phenomena disrupting the orderliness of the
computer's executions stream.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
iD8DBQFEaZ3kGkOzwaes7JsRAwZ9AJ9iZHEbAGuFH4JjtJyyv6fSFAht3QCfeKaV
vaV700/gaShGuUPeSMcJgZQ=
=4+4O
-----END PGP SIGNATURE-----