home | log | search | bash | stats | wiki


Matches for ephemeral key, 18 total results Sorted by newest | relevance

31-07-2015 02:25:36  <assbot>   Logged on 16-12-2014 01:40:04; asciilifeform: what follows is the payload, divided into K gibblets, each below udp mtu in size, each signed with ephemeral key. the gibblets are coded using fountain code (e.g. 'raptor') and you need N of K - in any order - to reassemble.

18-04-2015 03:51:27  <ben_vulpes>   http://log.bitcoin-assets.com/?date=18-04-2015#1103722 << have we not covered this? if one desires 'forward secrecy', just...create an ephemeral key.

18-04-2015 01:09:21  <assbot>   14 results for 'ephemeral key' : http://s.b-a.link/?q=ephemeral+key

18-04-2015 01:09:20  <danielpbarron>   !s ephemeral key

06-02-2015 01:51:18  <asciilifeform>   BingoBoingo: in the event one or the other participant is captured with his equipment, the ephemeral key is (presumably) gone.

06-02-2015 01:50:49  <asciilifeform>   BingoBoingo: otr/'forward secrecy' is simply the practice of generating an ephemeral key for a particular conversation, which is to be discarded later

11-01-2015 05:40:18  <assbot>   13 results for 'ephemeral key' : http://s.b-a.link/?q=ephemeral+key

11-01-2015 05:40:17  <asciilifeform>   !s ephemeral key

07-01-2015 03:59:22  <asciilifeform>   let's put it this way - if i wish for my words to successfully relay beyond my own node, i have to sign them with an ephemeral key

07-01-2015 01:36:56  <asciilifeform>   if successful (he signed nonce with an ephemeral key for which the machine being spoken to possesses a valid primary wot-key signature, or is in fact transmitting a new ephemeral pubkey signed by such a wotkey) - this creates a session.

07-01-2015 01:13:06  <asciilifeform>   576 can hold a 2048-bit (ephemeral rsa key!) sig, a reasonably long key fp, and small payload.

16-12-2014 02:04:23  <decimation>   well, it need not be a per-session ephemeral key in that case

16-12-2014 02:00:05  <asciilifeform>   i bet mircea_popescu can tell us why ephemeral key is a must

16-12-2014 01:58:17  <asciilifeform>   the ephemeral key is absolutely necessary.

16-12-2014 01:54:32  <asciilifeform>   to finish the earlier thread: machine on the other end of the link (destination) decides whether to keep packet and attempt payload reassembly based on simple criteria: 1) is it a hello from a wot-blessed (from his pov) key 2) is it signed by an ephemeral key from one such 'hello' received recently.

16-12-2014 01:40:04  <asciilifeform>   what follows is the payload, divided into K gibblets, each below udp mtu in size, each signed with ephemeral key. the gibblets are coded using fountain code (e.g. 'raptor') and you need N of K - in any order - to reassemble.

16-12-2014 01:38:56  <asciilifeform>   here's a very rough description of above experiment. to start a transmission a --> b, 'a' sends a hello (udp) packet, which consists of an ephemeral rsa key, hash and length of (coming) payload, and all of the preceding signed with his wot key. this fits handily below the traditional 576 byte mtu.

12-02-2014 16:32:01  <jurov>   nekay, gpg key is no less ephemeral than bitcoin