[Pidgin] #15642: Chat and file encryption

Pidgin trac at pidgin.im
Wed Oct 30 14:31:38 EDT 2013


#15642: Chat and file encryption
-------------------------+---------------------------
 Reporter:  CodeLurker   |       Owner:  EionRobb
     Type:  enhancement  |      Status:  new
Milestone:               |   Component:  unclassified
  Version:  2.10.7       |  Resolution:
 Keywords:               |
-------------------------+---------------------------

Comment (by CodeLurker):

 It seems to me that generating keys in a cloud ''decreases,'' not
 increases security; since private keys would be traveling over public
 networks.  The pidgin-encryption plugin can generate keys of 4096-bits in
 a not undue amount of time.  This is the level of encryption used by
 Snowden, and there was a report of only 37 documents out of perhaps
 hundreds of thousands of documents the NSA had been able to decrypt.  For
 now, it is pretty good privacy - no cloud needed.  There probably is no
 government holding keys to pidgin-encryption, as primes are generated
 locally when generating keys in a reasonable time; and the source is open.
 You could probably follow what they've done as a guide.  That is the
 nature of a trap-door function: computationally easy to go one way, and
 hard to go the other.

 Note: I would prefer that encryption not be limited to 4096 bits.

 I'm no cryptographic expert, but wouldn't 256-bit keys be more vulnerable
 to brute force trials?  With NSA having already been known to have
 backdoored one code they promoted, NSA-promoted codes such as AES should
 probably be treated with suspicion.  I don't know if sCrypt() can be
 better, but to my knowledge, RSA is still pretty good - if you use enough
 bits.  It is my understanding that you would need a 4096-bit quantum
 computer to break one in a timely manner - and those at least seem to be
 some ways off.

-- 
Ticket URL: <https://developer.pidgin.im/ticket/15642#comment:4>
Pidgin <http://pidgin.im>
Pidgin


More information about the Tracker mailing list