On Mon, Mar 25, 2019 at 10:07:05PM +0800, michael cheng wrote: > > > As for the key escrow problem frequently raised in the emails, indeed, > there is a PKG in the system which could generate each device's private > key. However, when IBS is used in TLS1.3, passively attack to recover the > session key is not possible. Actively man-in-the-middle attack by replacing > exchanged DH tokens and signatures would certainly leave traces even > transiently. Similarly, a PKG could impersonate an entity to conduct a TLS > session, just as the KMS in the symmetric key solution, but forensic traces > could be also collected in this situation. It would be hugely risky for a > PKG, which would usually be a trusted party, to launch such attacks. If > such an attack is caught in red-handed, no one would trust the PKG's > service anymore.
The risk here is not just limited to the PKG violating the trust placed in it -- there is also new attack surface on the PKG itself, and the risk that the PKG could become operationally compromised and an attacker obtain secrets in that manner. -Ben _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls