Re: How to Calculate Signatures?

hal@finney.org ("Hal Finney") Mon, 04 April 2005 18:05 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA05878 for <openpgp-archive@lists.ietf.org>; Mon, 4 Apr 2005 14:05:01 -0400 (EDT)
Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id j34HsaGL052023; Mon, 4 Apr 2005 10:54:36 -0700 (PDT) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id j34Hsa2K052022; Mon, 4 Apr 2005 10:54:36 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by above.proper.com (8.12.11/8.12.9) with ESMTP id j34HsZpF052015 for <ietf-openpgp@imc.org>; Mon, 4 Apr 2005 10:54:35 -0700 (PDT) (envelope-from hal@finney.org)
Received: by finney.org (Postfix, from userid 500) id A9E9F57EBA; Mon, 4 Apr 2005 11:08:05 -0700 (PDT)
To: ietf-openpgp@imc.org
Subject: Re: How to Calculate Signatures?
Message-Id: <20050404180805.A9E9F57EBA@finney.org>
Date: Mon, 04 Apr 2005 11:08:05 -0700
From: hal@finney.org
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Ian G wrote:
> >>I'm curious on this point.  Other than the fact that
> >>"it's broken" why is it that you see it important to
> >>repair the DSA in OpenPGP?
> > 
> Hal Finney wrote:
> > I'm not sure if you are asking why we worry about using SHA-1 at all given
> > that the attack is theoretical, or why we don't just abandon DSA keys.

Ian replied:
> I'd say it is an open question, so either or both.
>
> Hal Finney wrote:
> > For the first question, my main concern is that the SHA-1 attack
> > may get worse so that it becomes computationally feasible to find
> > collisions.  If that happens we could be vulnerable to attacks like
> > http://eprint.iacr.org/2005/067 which showed two X.509 certificates
> > with the same hash.  The attacks could become even stronger to where
> > different userids could collide.
>
> I think now I understand this as more an issue for
> WoT than documents - is that right?  (I think I'm
> deriving that from the last sentance above...)  In
> that people who have DSA keys and have lots of sigs
> are faced with losing their 'investment'.

The WoT issue related to the 2nd question about maintaining usability of
DSA keys.  The paragraph above related to the 1st question which was,
why are we worrying about the SHA-1 attack at all, given that it is
purely theoretical and no one has even exhibited a SHA-1 collision.

In the context of that question, it would apply to other situations than
just key signatures.  Ordinary document signatures could be vulnerable.
Alice could prepare a document for Bob to sign, arranging it that there
are two versions.

It could also apply to RSA users who are continuing to use SHA-1.
If the attack worsened, they could be invited to sign someone's key,
and then the data being signed could change.

Again, keep in mind that these paragraphs answer the question, why are
we worried about the attack at all.  Focus on that question in reading
the paragraphs above.

> > For the second, DSA key users do not presently have the options RSA
> > key users do to move to other hashes.  As I argued, the additional risk
> > of giving DSA users more options is not that large.  Letting them use
> > other hashes would allow them to continue to use their existing keys
> > and benefit from the signatures they have acquired on those keys.
>
>
> OK.  In risk terms it might not be that high.  But
> in cost terms, it is significant.  Any changes to
> the way signatures have to be dealt with would have
> to be promulgated through the community, as, if the
> signature verification wasn't standard and acceptable
> to all code bases, it loses its value rapidly.

I agree that if it takes that long for the change to propagate, we are
probably better off waiting for NIST to come up with FIPS 186-3 which
will specify how to use SHA-2 with DSS.

I have a faint hope that they may do something about including a hash
algorithm specifier that would make the standard more robust against
hash breaks.  Even a one octet hash ID similar to what we use in PGP
would greatly improve the flexibility.

The only reason I hold out this hope is that otherwise I don't see what
is taking them so long in releasing this spec.  It's been something like
two years since they announced that it was imminent.  If all they are
going to do is to come up with a few (p, q) size recommendations then
it shouldn't take that long.

If they don't do it, maybe we should think about doing this ourselves,
for next gen DSA keys.  We could include a one byte hash octet ID at
the front of the hash, and make the q size 8 bits bigger.  It would
mean that we are not fully DSS compliant but as Jon points out we are
not quite that way now.

Hal