[cryptography] fyi: Sovereign Keys: an EFF proposal for more secure TLS authentication

Martin Paljak martin at martinpaljak.net
Sun Nov 27 01:12:00 EST 2011


No, they had ecc and I saw no references to hash chains or trees. But that
would be a right/interesting direction.
On Nov 27, 2011 12:42 AM, "Adam Back" <adam at cypherspace.org> wrote:

> I only skimmed the high level but I presume they would be using a merkle
> hash-tree and time-stamp server or something like that so it cant revise
> its
> story later and its current state can be audited by anyone against its
> advertised information.
>
> Adam
>
> On Sat, Nov 26, 2011 at 11:36:11PM +1100, ianG wrote:
>
>>
>>  https://eff.org/sovereign-keys
>>>
>>> On that page you can find links to a high level overview and detailed
>>> design
>>> docs.  The design has a number of nice features, including very strong
>>> resistance to server impersonation attacks and automatic failover to
>>> secure
>>> routing methods (ideally, Tor hidden services) when server impersonation
>>> occurrs.
>>>
>>
>> As far as I can see, this is a third party repository for the keys.
>>  Which claims to reliabily deliver the keys on request?
>>
>> Is that it?
>>
>> iang
>> ______________________________**_________________
>> cryptography mailing list
>> cryptography at randombit.net
>> http://lists.randombit.net/**mailman/listinfo/cryptography<http://lists.randombit.net/mailman/listinfo/cryptography>
>>
> ______________________________**_________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/**mailman/listinfo/cryptography<http://lists.randombit.net/mailman/listinfo/cryptography>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20111127/f35b7a7a/attachment.html>


More information about the cryptography mailing list