On Thu, 28 Aug 2014 23:44, [email protected] said:

> * Easy way to migrate encryption keys into new devices.
>
> * Key recovery mechanisms so people don't loose their mail by accident.

These are closely related.  It is commonly known as backup/restore.
Fortunately we only need to care about the secret key which means we
need to backup 32 bytes plus an identification of 20 or 32 bytes for the
public key.  This can easily be achieved using a QR code.  Print it out
and for restore take a photo of it.  Right, this opens new paths for
local attacks on the secret key but if an attacker already has control
over the local device, we are anyway in game over state.  And it would
be a good start to make that easier.

The current protocols do not allow for an abbreviated backup scheme of
the secret key but it won't not be too complicated to do that.  As long
as we can assume that the public key is really public.  Data protection
rules may be a problem here.

> * Easy key rollover

In case of key compromise or for forward security?  The latter is more
problematic because you need to take the key offline but if you still
want to decrypt old messages (may be just 1 week, 1 month old) there
needs to be an easy way to restore them.

> be solved. But what has happened in the past is that they have been
> shuffled under the mat as 'advanced user problems'.

Yeah.


Salam-Shalom,

   Werner


-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

_______________________________________________
Endymail mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/endymail

Reply via email to