Browse Definitions :
Definition

perfect forward secrecy (PFS)

Perfect Forward Secrecy (PFS), also known as Forward Secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers. For every individual session initiated by a user, a unique session key is generated. If one of these session keys is compromised, data from any other session will not be affected. Therefore, past sessions and the information within them are protected from any future attacks.

Without perfect forward secrecy, a user initiates a communication session with a client and the entire conversation is encrypted based on the client’s special key. However, the client uses the same special key to generate encryption for all of its sessions, and if it becomes compromised, so does all of the information contained within each conversation.

With perfect forward secrecy, every communication session generates a unique encryption key that is separate from the special key, private, and only lasts for the duration of the session. If an attacker were to compromise one of the user’s special key, the conversations would stay encrypted and secure. Similarly, if an attacker were to compromise the unique encryption key, only that specific conversation would be leaked.

Protecting data on the transport layer of a network, perfect forward secrecy has become a security standard for developers to implement into messaging services or websites that are dedicated to user privacy. Tools applying this feature can change encryption keys as frequently as every text message, phone call, or page refresh. Recently, the Internet Engineering Task Force has published the Transport Layer Security Standard to mandate perfect forward secrecy for all TLS sessions.

Heartbleed and Perfect Forward Secrecy

Perfect forward secrecy became more of an interest after the introduction of the Heartbleed bug to OpenSSL in 2012. The vulnerability is a result of an insufficient input validation in the utilization of the Transport Layer Security protocol heartbeat extension. Heartbleed is known as a buffer over-read vulnerability and would allow the user to read more data than allowed, leaking an entire chain of information up to 64 kilobytes.

While Heartbleed has been publicly disclosed since 2014, it proved the simplicity of an OpenSSL attack and sparked the conversation around temporary methods of key exchange. Thus, perfect forward secrecy became a viable solution for protecting users from similar code defects.

Perfect Forward Secrecy in Use

Perfect forward secrecy has become widely adopted by information providers since its inception and is known as a crucial security feature. Signal, a messaging protocol for end-to-end encryption found in WhatsApp, Google Allo messenger, and Facebook conversations, popularized perfect forward secrecy. Known as the “double ratchet” system, Signal creates a new encryption key with every single message. Most recently, it also introduced a feature that enables messages to self-destruct.

In 2011, Google provided Gmail, Google Docs, and encrypted search users with perfect forward secrecy by default. Twitter has offered perfect forward secrecy to all users since 2013. Apple announced in 2016 a new, mandatory protocol for all iOS apps requiring the use of App Transport Security, a security feature that utilizes perfect forward secrecy.

This was last updated in September 2018

Continue Reading About perfect forward secrecy (PFS)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close