0

Wikipedia states that Perfect Forward Secrecy "is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if the private key of the server is compromised".

In the example on Wikipedia two partner us a "key exchange algorithm such as Diffie–Hellman, to securely agree on an ephemeral session key. They use the [private] keys [...] only to authenticate one another during this process".

I understand that by using a ephemeral session key, if the private key is compromised the session is still secure. What I can not understand is, if you capture all traffic, can you not encrypt the key exchange part of the session and therefore gain the session key which then can be used to encrypt the session? Is this secured by the Diffie-Hellman key exchange?

leo
  • 103
  • 3
  • What if both sides throw the randomly generated a and b after the key agreement and delete the key after usage? If your random number generator is good, you are fine. – kelalaka Feb 15 '20 at 20:59
  • *"What I can not understand is, if you capture all traffic, can you not encrypt the key exchange part of the session and therefore gain the session key which then can be used to encrypt the session?"* - you are basically asking how Diffie Hellman works and why a key exchange using DH is safe. Therefore marked as duplicate. – Steffen Ullrich Feb 15 '20 at 21:10

0 Answers0