New design sets a high standard for post-quantum readiness.

  • ignirtoq@fedia.io
    link
    fedilink
    arrow-up
    12
    ·
    5 days ago

    While a TLS uses the same key throughout a session, keys within a Signal session constantly evolve.

    What are we defining as a “session” for Signal? The vast majority of TLS sessions exist for the duration of pulling down a web page. Dynamically interact with that page? New HTTP request backed by a new TLS session. Sure, there are exceptions like WebSockets, but by and large TLS sessions are often short.

    Is a Signal session the duration of sending a single message? An entire conversation? The entire time you have someone in your address book? It doesn’t seem like an apples-to-apples comparison.

    • jacksilver@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      5 days ago

      I think the biggest thing here is that beyond just a session key (to make sessions secure from each other), this approach uses a rotating session key. That means each transaction in a sesssion is unique ensuring forward and backward secrecy.

      I may have read it wrong plus cybersecurity is not my forte.

    • Valmond@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      Isn’t asymmetric used for the handshake only? And then like AES or something which have evolving keys (and are quite quantum resistant).