Tech Talk Topics
      Improvements to Encryption Protocols
      We assume that encryption can be treated like a black box, and thus is outside of the scope of this talk.
      Long Term Keys
      Design
      Easiest model, simply pick a key and use it forever.
      Problems
      Messages can be decrypted by key leakage and bruteforcing.
      Future Secrecy
      Design
      
         Hash each key to get the next key, and delete keys after decryption because they are only used once.
 
         This model relies on the trapdoor nature of hash functions to prevent decryption of historical messages on key leakage and reduces likelyhood of leakage by removing keys as soon as possible.
 
      
      Problems
      Key leakage does not protect messages moving forward.
      Perfect Forward Secrecy
      Design
      
         Each message uses a session encryption key, that is unrelated between messages, and keys are deleted after decryption because they are only used once.
 
         Key leakage only affects one message and likelyhood of leakage is reduced by removing keys as soon as possible.
 
      
      In-Depth