RE: FW: New Version Notification for draft-rafiee-6man-cga-attack-00.txt

"Hosnieh Rafiee" <ietf@rozanak.com> Sun, 01 December 2013 21:54 UTC

Return-Path: <ietf@rozanak.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17F891AE183 for <ipv6@ietfa.amsl.com>; Sun, 1 Dec 2013 13:54:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zzqhiPR3nyIr for <ipv6@ietfa.amsl.com>; Sun, 1 Dec 2013 13:54:15 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id 2311E1AE19B for <ipv6@ietf.org>; Sun, 1 Dec 2013 13:54:15 -0800 (PST)
Received: from kopoli (g231251071.adsl.alicedsl.de [92.231.251.71]) by mrelay.perfora.net (node=mrus3) with ESMTP (Nemesis) id 0M8eMt-1VQMSB1XcZ-00vV8b; Sun, 01 Dec 2013 16:54:06 -0500
From: Hosnieh Rafiee <ietf@rozanak.com>
To: 'marcelo bagnulo braun' <marcelo@it.uc3m.es>, 'Christian Huitema' <huitema@microsoft.com>, 'Ray Hunter' <v6ops@globis.net>
References: <005601ceec99$ed4cfc40$c7e6f4c0$@rozanak.com> <C91E67751B1EFF41B857DE2FE1F68ABA2FBC395D@tk5ex14mbxc272.redmond.corp.microsoft.com> <000001ceecd4$a69b4aa0$f3d1dfe0$@rozanak.com> <529845A5.5060807@it.uc3m.es>
In-Reply-To: <529845A5.5060807@it.uc3m.es>
Subject: RE: FW: New Version Notification for draft-rafiee-6man-cga-attack-00.txt
Date: Sun, 01 Dec 2013 22:53:56 +0100
Message-ID: <001101ceeedf$da768080$8f638180$@rozanak.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQE9GJPvaSDmmxKcFe2y5aQoBrVllQKrUp7gAeLS6X0CJEgPzZst+ctQ
Content-Language: en-us
X-Provags-ID: V02:K0:pRONXKzi+R9hw6iRS2zscl5fh2tJ+kLUeTfQ9VUog6h 60fx3Xg6QfMZ8J9/SHQUAIxFGzUHvcuGM0mXS/16bc5VRjY95z 9Jr+tNoOhLoZtO52DnyheIJLGP5aaUpZUU/Y4/qs77C23nOtHj 0zJv49PoZrSUlwgnQDP2nKVe9tbCtJxmvhikIPTXieM7Z3+MEO 2knBBy/h0WeCHQ/pD84VHvL/pD2RgHxws5T/qhZJh+Th9yxmXJ fwGnd2aYd1U+idRPgYngZTVnDgiOn1WUHxdf8z0bn86c/SO539 0omCPEe24j4YANL2NUg6uqqHOcEFLPAHQDSmRwqbP8aXK5mUDZ rBYLHyB/uIlzzJVL/E/4=
Cc: ipv6@ietf.org, 'Erik Nordmark' <nordmark@sonic.net>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 21:54:17 -0000

> El 29/11/13 08:28, Hosnieh Rafiee escribió:
> >
> >
> > In CGA, we have a hash function or like the above example, we have a
> > hash password. What is important for us is only find another message
> > that leads to the same hash. This is where birthday paradox applies.
> > So, in CGA, the attacker really does not care what is the content of
> > your message, it cares about the hash value. He only wants to have
> > another message (or in birthday paradox to have another person with
> > the same birthday that matches yours) to match yours.
> >
> 
> sigh, no.
> 
> the birthday paradox applies when you want to find two values that match
> each other and NOT when you have a target and you want to find a hash
> output that matches the target of your attack.
> 
> In other words, the birthday paradox is not about finding another person
that
> has the same birthday than you but about finding two persons that happen
to
> have the same birthday.
> 
> This is a critical distinction when you want to use this for an attack, as
you
> cannot rely on this to attack a specific target, you can only use it for
finding
> two random values that clash.


Birthday attack is still possible with the following approach. Check this
nice article.
http://eprint.iacr.org/2003/065.pdf   

smile,
Hosnieh