Agreed. But, breaking the session key only works for a single message or a single session. If they want to target a specific individual, breaking the RSA/DSA keys will give them access to all encrypted messages. (within the context is that a sent message is encrypted by the recipient's public key), so to make this bidierctional they need to break 2 keys, so the job gets more difficult. Breaking the session key works if they want to look at random messages, but breaking the RSA/DSA keys woprks better when they have a specific target in mind.

On 08/13/2013 05:40 PM, Richard Pieri wrote:
John Abreau wrote:
Nope, sorry, each individual message has its own unique session key.
Cracking the session key on one particular message tells you nothing
about the session key on subsequent messages.

If I decrypt the message by breaking the session key then yes, I can only decrypt that one message.

But, if I can do this then I know what the session key is. This means that I have a 100% known plain-text correspondence with the encrypted session key. This may make it easier to attack a given RSA or DSA key pair.

Attacking the RSA or DSA asymmetric keys directly is believed to be more difficult than attacking the session key. Given that the NSA has approved both for commercial use, just as they have approved AES for commercial use, I assume that they are aware of exploitable weaknesses in both.



--
Jerry Feldman <[email protected]>
Boston Linux and Unix
PGP key id:3BC1EB90
PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66  C0AF 7CEA 30FC 3BC1 EB90

_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss

Reply via email to