On Tue, Sep 17, 2013 at 2:01 PM, Michael Rogers
<mich...@briarproject.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi Marco,
>
> This is a problem we're working on as part of the Briar project. Our
> approach is pretty simple: establish a shared secret when you first
> communicate, periodically run that secret through a one-way function
> to get a new shared secret, and destroy the old one.

Why not have separate symmetric keys for each direction of
communication (Alice -> Bob, Bob->Alice).

Then whenever a party encrypts or decrypts a message, they can update
the corresponding key right away, instead of having to wait.

(Or look at OTR's use of updating Diffie-Hellmans).


Trevor
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to