Re: [Cfrg] A downside of deterministic DL signatures?

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Thu, 31 July 2014 17:23 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 124E21B2951 for <cfrg@ietfa.amsl.com>; Thu, 31 Jul 2014 10:23:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8bMwlnMNPkXT for <cfrg@ietfa.amsl.com>; Thu, 31 Jul 2014 10:23:36 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [209.234.253.108]) by ietfa.amsl.com (Postfix) with ESMTP id 9E6A71B2955 for <cfrg@irtf.org>; Thu, 31 Jul 2014 10:23:21 -0700 (PDT)
Received: from [10.70.10.93] (unknown [38.109.115.130]) by che.mayfirst.org (Postfix) with ESMTPSA id 36D6EF984; Thu, 31 Jul 2014 13:23:17 -0400 (EDT)
Message-ID: <53DA7B79.70709@fifthhorseman.net>
Date: Thu, 31 Jul 2014 13:23:05 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Icedove/30.0
MIME-Version: 1.0
To: Tony Arcieri <bascule@gmail.com>, Michael Hamburg <mike@shiftleft.org>
References: <20140729205846.6639765.71649.17355@certicom.com> <CAHOTMVJ4AirY+tRnVfwt1umgx=Q2xNwVTks6OoVNaV0gkKihOg@mail.gmail.com> <947D45A1-AF36-470B-8D50-7600FEF7FB30@shiftleft.org> <CAHOTMVJYr=S1fXXSYCHDJz2m6sn10uQ=ztXT7htW1m53qEZHog@mail.gmail.com>
In-Reply-To: <CAHOTMVJYr=S1fXXSYCHDJz2m6sn10uQ=ztXT7htW1m53qEZHog@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="xoIbFDcEhowCJXeQVSB3BqUSTLT9UUd8b"
Archived-At: http://mailarchive.ietf.org/arch/msg/cfrg/oEaNHTrpXz72Q_tEksNK-13u29s
Cc: Dan Brown <dbrown@certicom.com>, IRTF Crypto Forum Research Group <cfrg@irtf.org>
Subject: Re: [Cfrg] A downside of deterministic DL signatures?
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Jul 2014 17:23:39 -0000

On 07/31/2014 01:08 PM, Tony Arcieri wrote:
> On Thu, Jul 31, 2014 at 12:40 AM, Michael Hamburg <mike@shiftleft.org>
> wrote:
> 
>> Indeed.  But collision attacks have also broken signature schemes *in
>> practice*, for example the Flame malware.
>>
> 
> Are there any other examples of collision attacks in the wild? Also note
> this attack required a nationstate-level effort.

sure:

  http://www.win.tue.nl/hashclash/rogue-ca/

and other instances from the same group, including the cheeky:

  http://www.win.tue.nl/hashclash/Nostradamus/

neither of these required nationstate-level effort, and they date back
to 2008.

	--dkg