Re: [openpgp] Followup on fingerprints

"Derek Atkins" <derek@ihtfp.com> Mon, 03 August 2015 17:20 UTC

Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A3EA1B2AA2 for <openpgp@ietfa.amsl.com>; Mon, 3 Aug 2015 10:20:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.72
X-Spam-Level:
X-Spam-Status: No, score=0.72 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, HELO_MISMATCH_ORG=0.611, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rO5e8_g0ik_O for <openpgp@ietfa.amsl.com>; Mon, 3 Aug 2015 10:20:12 -0700 (PDT)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21E971ACEFD for <openpgp@ietf.org>; Mon, 3 Aug 2015 10:20:12 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id B27AEE2034; Mon, 3 Aug 2015 13:20:10 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 07682-07; Mon, 3 Aug 2015 13:20:08 -0400 (EDT)
Received: by mail2.ihtfp.org (Postfix, from userid 48) id C0055E2035; Mon, 3 Aug 2015 13:20:08 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1438622408; bh=s9oD53boGUOiSrP6D3c7HO85L0YROUdt6qB2Ts/qHvU=; h=In-Reply-To:References:Date:Subject:From:To:Cc; b=Qcc89Y4BlpKePI8hYS/ADsrJ4SuU4xhQc+P2TnfO8J9PTFN7fFeLv1iCXMezxMsDu 5ZFp6z1Wbz7sqSHsOc4sppWBIRn/y9vRo9E9YimpciNSFV24/FMRuszdVqHnPbQ4If QYhW8Uek5Y9bd4HMxeIsGX/e298E39VSPiPUbymA=
Received: from 192.168.248.204 (SquirrelMail authenticated user warlord) by mail2.ihtfp.org with HTTP; Mon, 3 Aug 2015 13:20:08 -0400
Message-ID: <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org>
In-Reply-To: <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com>
References: <CAMm+LwgTcn8CY+Zk-f9gzXQtMJezG97T+kx2=C7PR5g7zFer_A@mail.gmail.com> <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com> <87zj2ecmv8.fsf@alice.fifthhorseman.net> <CAMm+LwgKmcTes=V7uS3MjCQixWCo-i7PY=VE7eCHSqt3Ho3OSg@mail.gmail.com> <87a8udd4u6.fsf@alice.fifthhorseman.net> <sjm61503182.fsf@securerf.ihtfp.org> <CAMm+LwgEVySpfL-iN2uzX-4tu7R+isDkHE9D8uAeLTxxd4VxqQ@mail.gmail.com> <sjmwpxc1kbv.fsf@securerf.ihtfp.org> <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com>
Date: Mon, 03 Aug 2015 13:20:08 -0400
From: Derek Atkins <derek@ihtfp.com>
To: Gregory Maxwell <gmaxwell@gmail.com>
User-Agent: SquirrelMail/1.4.22-14.fc20
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/M0Zm7JFgBRb-15QSbsEtzOilpic>
Cc: Phillip Hallam-Baker <phill@hallambaker.com>, Derek Atkins <derek@ihtfp.com>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>, IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Aug 2015 17:20:13 -0000

On Mon, August 3, 2015 12:59 pm, Gregory Maxwell wrote:
> On Mon, Aug 3, 2015 at 3:08 PM, Derek Atkins <derek@ihtfp.com> wrote:
>> Remember, the fingerprint is over the public key, so you still have to
>> actually perform the ECC g^x operation for each trial.
>
> Take care to not confuse what you would do with what an attacker _must_
> do.
>
> For each new key to generate the attacker can perform only a single
> addition of G or a doubling (whichever is faster for the curve in
> question), then a conversion to affine (which is nearly free--
> marginally, ~one field multiply-- if done in a batch).
>
> E.g. You compute,
> P_0 = xG
> P_1 = P_0 + G  (x_1 = x_0 + 1)
> P_2 = P_1 + G  (x_2 = x_1 + 1)
> ...
>
> There are even faster techniques available for some curves.
>
> If software for this doesn't run in the rough ballpark of a million
> per second on a current gen laptop/desktop or 10 million/sec on a GPU
> even on a fairly generic curve, it's probably completely naieve.

Luckily my computations (which you unfortunately cut out) were based on 30
million attempts per second, so my results (the attack taking over a year)
is still correct!  Indeed, your numbers are still 3x slower than my
computation estimates.

-derek
-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant