-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Aug 29, 2013, at 3:43 AM, Jerry Leichter <[email protected]> wrote:
> - If I need to change because the private key was compromised, there's
> nothing I can do about past messages; the question is what I do to minimize
> the number of new messages that will arrive with a now-known-insecure key.
> This was the case I assumed the previous poster was concerned with.
Personally, I think you shouldn't worry about this.
The real sin is getting an attachment to a key. You are much better off
developing a philosophy of key management in which you use it and then get rid
of it regularly.
If you do this reasonably well, it reduces the chance that a key will get
compromised because its aegis, footprint, shadow, etc. is small. It also
reduces the effect because most likely it takes more time to break the key than
its lifetime; I consider hacking the key, stealing it, etc. to be a form of
breaking. Stealing a key through a 'sploit is also cryptanalysis.
Be Buddist about your keys and have no attachments. (This is also a good
philosophy about mail, but that's a different discussion.)
> - As I outlined things, there was never a reason you couldn't have multiple
> public keys, and in fact it would be a good idea to make traffic analysis
> harder. Adding a new key for "a new facet of your electronic life" is
> trivial.
That's a fine step to a good attitude, but the effect on traffic analysis will
be small or close to nil. Traffic analysis includes social graph analysis and
any good social graph analysis will include probabilities that an entity will
have different personae. Keys are just masks, too, just like a persona.
Jon
-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 3.2.0 (Build 1672)
Charset: us-ascii
wj8DBQFSIC5MsTedWZOD3gYRAmpmAJ0UJ7K9GWo9FLSa8HR1CmSbWRZcgQCgkuif
rbTWOi5eHdxNpRzQ9VkqDBY=
=PpOZ
-----END PGP SIGNATURE-----
_______________________________________________
The cryptography mailing list
[email protected]
http://www.metzdowd.com/mailman/listinfo/cryptography