Re: [openpgp] Fingerprints and their collisions resistance

Andrey Jivsov <openpgp@brainhub.org> Thu, 03 January 2013 19:06 UTC

Return-Path: <openpgp@brainhub.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FE3121F8A9B for <openpgp@ietfa.amsl.com>; Thu, 3 Jan 2013 11:06:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.437
X-Spam-Level:
X-Spam-Status: No, score=-0.437 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uSKwEJxWtrH2 for <openpgp@ietfa.amsl.com>; Thu, 3 Jan 2013 11:06:22 -0800 (PST)
Received: from qmta01.emeryville.ca.mail.comcast.net (qmta01.emeryville.ca.mail.comcast.net [IPv6:2001:558:fe2d:43:76:96:30:16]) by ietfa.amsl.com (Postfix) with ESMTP id D720821F86C8 for <openpgp@ietf.org>; Thu, 3 Jan 2013 11:06:19 -0800 (PST)
Received: from omta04.emeryville.ca.mail.comcast.net ([76.96.30.35]) by qmta01.emeryville.ca.mail.comcast.net with comcast id jTCh1k0050lTkoCA1X6KGs; Thu, 03 Jan 2013 19:06:19 +0000
Received: from [192.168.1.8] ([69.181.162.123]) by omta04.emeryville.ca.mail.comcast.net with comcast id jX6J1k00B2g33ZR8QX6Jau; Thu, 03 Jan 2013 19:06:19 +0000
Message-ID: <50E5D6AA.6060200@brainhub.org>
Date: Thu, 03 Jan 2013 11:06:18 -0800
From: Andrey Jivsov <openpgp@brainhub.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:13.0) Gecko/20120605 Thunderbird/13.0
MIME-Version: 1.0
To: Jon Callas <jon@callas.org>
References: <50E530D6.6020609@brainhub.org> <D3684BB5-FDC6-4834-8FAE-C482A25E3FB0@callas.org>
In-Reply-To: <D3684BB5-FDC6-4834-8FAE-C482A25E3FB0@callas.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20121106; t=1357239979; bh=xwEzLH63Yq1BBN6wvI5cJI+OzvCAb5pqSXNPSkwbLbo=; h=Received:Received:Message-ID:Date:From:MIME-Version:To:Subject: Content-Type; b=UREB7lrjB7X9EJm2vb3nEq2VKIKqQgmvrSwAJi3O+b0+SqTqM3O7L4V4JmX6a/nBE 5idDy21ni/iIStFKuQv82ygmMMhKzmFuXUPX+I3Tj6saTdQTYMkxbwM77rdFX31mfA RrJztSnu8E8FmA1X/Q9SIlDsvbeD/XNy80e89qrqW3EQ4t9iQa1/LKlMYZW50Vdv2R 9EUGWLAvbCAva1UaU+0r1b4Iq1cumYVhjvxGIaouMSRvlcsk7fXmnDZamqaJ0AaEbj Cwfx9PKksTJQMvyetZ1YUXUHCP8fzvkYaBA/u+m5sxakJA/5i3n9xRvciYHRzpDNUB bvrReSBqsKDWA==
Cc: openpgp@ietf.org
Subject: Re: [openpgp] Fingerprints and their collisions resistance
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Jan 2013 19:06:23 -0000

On 01/03/2013 08:17 AM, Jon Callas wrote:
> The proposal that we had a long time ago which was essentially prefix a hash with an algorithm number was a good one. I remember everyone thinking it was a good idea and no one belling the cat. I vaguely remember someone writing up an I-D on it, too.
>
> That's the way I'd go, as it's future-proofed.
>
> 	Jon
>

I am a big fan of algorithm agility myself, but I have a difficult time 
justifying the additional complexity that the new *suite* of the 
fingerprints would bring v.s. just one new fingerprint algorithm.

Compare the situation with the AES. There are 3 AES sizes and other 
ciphers in use. Other ciphers exist as legacy ciphers that preceded AES 
or for regulatory reasons. 3 AES sizes exist for performance reasons.

None of these concerns apply for the new algorithm we are introducing ( 
we have clarity of future strength, small input for hashing, no 
export/import control of encryption). Fingerptins are special data 
structures because they are sometimes input by humans.

We now have SHA-3, which is good for a few decades ( and also SHA-2s are 
not so bad ).

Here is a more technical description, to be specific:

Let's say we choose SHA-3-384, which is no more difficult to implement 
than SHA-2. We then simply use the current fingerprint algorithm but 
instead of SHA-1 use SHA-3-384. Then allow truncation of the output 
(it's already implied by the 8 byte keyIDs). 20 byte fingerprint on a 
business card may be reasonable, but we also would like to have full 
strength for regulatory compliance. Consider not hashing the key 
creation date. Fixing all the variables in this paragraph, we have the 
new single fingerprint algorithm.

To put it differently, users may care about the hash associated with a 
signed message, but I don't think they materially care about the flavour 
of the fingerprint (as long as it's a "strong" one).