Secure voice software issues

Graham Toal gtoal at an-teallach.com
Thu Aug 12 03:22:50 PDT 1993


In article <9308111916.AA03336 at servo> karn at qualcomm.com writes:
 > Voice calls are different, as the availability of a two-way path lets
 > you do things much more securely. If you generate a session key with
 > DH and use PGP/RSA *only to sign the exchanges*, not to encrypt the
 > session key, then even if your RSA secret key is later compromised, it
 > would not compromise those session keys that had already been created,
 > used and destroyed.

Thanks for that explanation, that bit hadn't sunk in with me!

This makes me think... something similar would be a good extension to
SMTP wouldn't it?  DH exchange of keys before sending point to point
mail?  With the user's public keys being picked up via their .mailrc
or .pgpkey or something...

(It would only happen if both SMTP's supported it and both users had
made their public key available to the mail system)

I'm thinking of ways of automatically and easily encoding all traffic
by default, to avoid line snooping.  I'm not suggesting this as an
alternative to explicitly encrypting things you want to keep private.
You could still do that too.

G
===
Personal mail to gtoal at gtoal.com (I read it in the evenings)
Business mail to gtoal at an-teallach.com (Be careful with the spelling!)
Faxes to An Teallach Limited: 031 662 4678  Voice: 031 668 1550 x212







More information about the cypherpunks-legacy mailing list