[Discuss] email privacy/security

Richard Pieri richard.pieri at gmail.com
Tue Aug 6 10:30:00 EDT 2013


Kent Borg wrote:
> That doesn't give them session keys for communications.

If the NSA can get copies of the public root certificates then they can 
either get the site/server certs from the CAs or forge their own. Either 
way, a compromised root certificate is the key to the entire chain of trust.

Self-signed certificates can't be compromised this way because there is 
no root CA involved. On the other hand, the quantity of traffic 
encrypted with self-signed certificates is quite small compared to the 
traffic encrypted with public CA certificates. Most of these use AES as 
one of the preferred ciphers. AES, a cipher approved by the NSA for 
commercial use. There is no doubt in my mind that the NSA can break AES 
in substantially less than polynomial time.

-- 
Rich P.



More information about the Discuss mailing list