Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forward secrecy #91

Open
tireddy2 opened this issue Feb 6, 2024 · 0 comments
Open

Forward secrecy #91

tireddy2 opened this issue Feb 6, 2024 · 0 comments

Comments

@tireddy2
Copy link
Collaborator

tireddy2 commented Feb 6, 2024

However, because send and receive keys are derived from independent traffic secrets, retaining the receive traffic secret does not threaten the forward secrecy of data sent before the sender changed keys.

Comment> I can't parse the above line. In TLS 1.3, the send and receive keys are derived from the main secret and if the main secret is compromised, both the send and receive keys can be calculated by the attacker. I get that with HPKE, the send and receive keys are derived from independent traffic secrets.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant