Re: [openpgp] Followup on fingerprints

Peter Pentchev <roam@ringlet.net> Mon, 03 August 2015 17:32 UTC

Return-Path: <roam@ringlet.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57FA41B2D30 for <openpgp@ietfa.amsl.com>; Mon, 3 Aug 2015 10:32:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.5
X-Spam-Level:
X-Spam-Status: No, score=-0.5 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M9pT5vyNQNaV for <openpgp@ietfa.amsl.com>; Mon, 3 Aug 2015 10:32:34 -0700 (PDT)
Received: from nimbus.fccf.net (nimbus.fccf.net [77.77.144.35]) by ietfa.amsl.com (Postfix) with ESMTP id 25F471B2D2A for <openpgp@ietf.org>; Mon, 3 Aug 2015 10:32:34 -0700 (PDT)
Received: from straylight.m.ringlet.net (unknown [46.233.30.128]) by nimbus.fccf.net (Postfix) with ESMTPSA id 5AAA010E6 for <openpgp@ietf.org>; Mon, 3 Aug 2015 20:32:32 +0300 (EEST)
Received: from roam (uid 1000) (envelope-from roam@ringlet.net) id 254035f by straylight.m.ringlet.net (DragonFly Mail Agent v0.9); Mon, 03 Aug 2015 20:32:31 +0300
Date: Mon, 03 Aug 2015 20:32:31 +0300
From: Peter Pentchev <roam@ringlet.net>
To: Derek Atkins <derek@ihtfp.com>
Message-ID: <20150803173231.GG3067@straylight.m.ringlet.net>
References: <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com> <87zj2ecmv8.fsf@alice.fifthhorseman.net> <CAMm+LwgKmcTes=V7uS3MjCQixWCo-i7PY=VE7eCHSqt3Ho3OSg@mail.gmail.com> <87a8udd4u6.fsf@alice.fifthhorseman.net> <sjm61503182.fsf@securerf.ihtfp.org> <CAMm+LwgEVySpfL-iN2uzX-4tu7R+isDkHE9D8uAeLTxxd4VxqQ@mail.gmail.com> <sjmwpxc1kbv.fsf@securerf.ihtfp.org> <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com> <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="m1UC1K4AOz1Ywdkx"
Content-Disposition: inline
In-Reply-To: <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/6WUz6aU8iCzTwrrKqX0gNXxrxBQ>
Cc: Gregory Maxwell <gmaxwell@gmail.com>, Phillip Hallam-Baker <phill@hallambaker.com>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>, IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Aug 2015 17:32:40 -0000

On Mon, Aug 03, 2015 at 01:20:08PM -0400, Derek Atkins wrote:
> 
> On Mon, August 3, 2015 12:59 pm, Gregory Maxwell wrote:
> > On Mon, Aug 3, 2015 at 3:08 PM, Derek Atkins <derek@ihtfp.com> wrote:
> >> Remember, the fingerprint is over the public key, so you still have to
> >> actually perform the ECC g^x operation for each trial.
> >
> > Take care to not confuse what you would do with what an attacker _must_
> > do.
> >
> > For each new key to generate the attacker can perform only a single
> > addition of G or a doubling (whichever is faster for the curve in
> > question), then a conversion to affine (which is nearly free--
> > marginally, ~one field multiply-- if done in a batch).
> >
> > E.g. You compute,
> > P_0 = xG
> > P_1 = P_0 + G  (x_1 = x_0 + 1)
> > P_2 = P_1 + G  (x_2 = x_1 + 1)
> > ...
> >
> > There are even faster techniques available for some curves.
> >
> > If software for this doesn't run in the rough ballpark of a million
> > per second on a current gen laptop/desktop or 10 million/sec on a GPU
> > even on a fairly generic curve, it's probably completely naieve.
> 
> Luckily my computations (which you unfortunately cut out) were based on 30
> million attempts per second, so my results (the attack taking over a year)
> is still correct!  Indeed, your numbers are still 3x slower than my
> computation estimates.

Um, I believe that the point is that Mallory doesn't *need* to brute-force
anything to create two keys with almost-identical hashes.  ICBW, but I think
that the idea is that Mallory, in the process of creating the first key,
is in possession of some intermediate information that enables him to create
a related key much cheaper, with a single run.

G'luck,
Peter

-- 
Peter Pentchev  roam@ringlet.net roam@FreeBSD.org pp@storpool.com
PGP key:        http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13