[openpgp] Re: Deterministic generation of (symmetric) public key params from private key params

Justus Winter <justus@sequoia-pgp.org> Wed, 13 November 2024 14:04 UTC

Return-Path: <justus@sequoia-pgp.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD6DAC1ECA6C for <openpgp@ietfa.amsl.com>; Wed, 13 Nov 2024 06:04:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (4096-bit key) header.d=sequoia-pgp.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Inrb7PEdKdlE for <openpgp@ietfa.amsl.com>; Wed, 13 Nov 2024 06:04:17 -0800 (PST)
Received: from mailgate02.uberspace.is (mailgate02.uberspace.is [IPv6:2a00:d0c0:200:0:1c7b:a6ff:fee0:8ea4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13E3CC09036F for <openpgp@ietf.org>; Wed, 13 Nov 2024 06:03:57 -0800 (PST)
Received: from harrington.uberspace.de (harrington.uberspace.de [185.26.156.85]) by mailgate02.uberspace.is (Postfix) with ESMTPS id C0DAA1813A9 for <openpgp@ietf.org>; Wed, 13 Nov 2024 15:03:54 +0100 (CET)
Received: (qmail 4169 invoked by uid 500); 13 Nov 2024 14:03:54 -0000
Authentication-Results: harrington.uberspace.de; auth=pass (plain)
Received: from unknown (HELO unkown) (::1) by harrington.uberspace.de (Haraka/3.0.1) with ESMTPSA; Wed, 13 Nov 2024 15:03:54 +0100
From: Justus Winter <justus@sequoia-pgp.org>
To: Daniel Huigens <d.huigens=40protonmail.com@dmarc.ietf.org>, IETF OpenPGP WG <openpgp@ietf.org>
In-Reply-To: <FxKXcgs81L4JQJjqV8sB_941ghtKVj5cjVYx6povy95enL27NdtRWhG5cLgElc9jJXQRqFqbTroNYlSL1agjgDVfRTmKJtKVwJkC0U1PmS8=@protonmail.com>
References: <FxKXcgs81L4JQJjqV8sB_941ghtKVj5cjVYx6povy95enL27NdtRWhG5cLgElc9jJXQRqFqbTroNYlSL1agjgDVfRTmKJtKVwJkC0U1PmS8=@protonmail.com>
Date: Wed, 13 Nov 2024 15:03:53 +0100
Message-ID: <87a5e3xmba.fsf@europ.lan>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
X-Rspamd-Bar: -----
X-Rspamd-Report: BAYES_HAM(-2.991417) SIGNED_PGP(-2) MIME_GOOD(-0.2)
X-Rspamd-Score: -5.191417
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sequoia-pgp.org; s=uberspace; h=from:to:subject:date; bh=aIiUEuDjOv6bWRC2LGbc6oeC/uoHdvxQN3ST56idQq0=; b=RFMhcqWTIc/0OtXQzsNqr5BSH6hMVhtBenm2Hq7DeyLdpo5plen6ZZv5AJ4MSIRmwiCcR+syym IMmNr8XVb0pzdkPxitu47bOH9nb/fx0sEzY3nCenL/40i4rMvRKe2m0x8vmiuSImEJaWeNvVNsPy l2aSKj19YtNduqUa6kjjmvFXnj/9K/8JOAnGsVtnuNReO0itx1fnOBQJHS3R/K4vgUHX9k/4FYDy PtGuBxJlTMr/UrDSOh7Oqhg8DlazikUoqUGv2KrBpREZqerHfxnk2fldLTPb0ANuGTlo0uMFv1pf 0tLb2jeiYXyMHjkpx0jH0t7CM7NK4pjRbTVppLE8ldJdFj7Hr+UeivjgkRR0Yd/nTv2JtDod+0al deNB4bnX6OOfvxFCyK+PNtWO53NPkPPa2zyge7JY9cNdsgVT/5IOdMVVOhGYS/R5VtKRlWHBVtrY V3Dqx+aiiZsydT9A6fGDO4IefbdI64tV+2yem3LsAjly0QL6gMe44LVhGsZsHc+5F/RCWpa+wn5y LUl3epSKK4R35IzLZIQl9afj/Tksyy62RI3csGjvIgCddmRbvasRyWbDd9jp3UOk7W/3efO7449K TjaNuvl1wDgHBlanQVg+TdEOoZsuTebcAcYvHk8/glti862A1kMXzlDdOmRsG1RBsyF7KKUmLLGx c=
Message-ID-Hash: V7TX4DV4SBE62DFUTPULVGPCGSMCKL4A
X-Message-ID-Hash: V7TX4DV4SBE62DFUTPULVGPCGSMCKL4A
X-MailFrom: justus@sequoia-pgp.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Deterministic generation of (symmetric) public key params from private key params
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/Y4deKznXbTyiWDjO4e767DFkZWk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>

Hi Daniel :)

Daniel Huigens <d.huigens=40protonmail.com@dmarc.ietf.org> writes:

> In the meeting last week, Justus noted that folks might want to
> deterministically generate key pairs from the private key material
> (presumably by storing some metadata like the key generation time).
>
> And, the change in draft-ietf-openpgp-persistent-symmetric-keys-00
> complicates this, by no longer storing the hash seed in the private
> key material.
>
> So, you'd have to store some additional algorithm-specific metadata
> from the public key material, namely the fingerprint seed.
>
> Since we didn't have much time for discussion last week, I thought I'd
> ask the wider WG here whether this is a use case people care about,
> and whether this workaround would be sufficient?

I don't understand the motivation for the hash seed in the first place.
Why not derive a mock public key from the secret key, i.e. include
SHA2-256(persistent symmetric key material) in the algorithm-specific
bits of the public key packet?

Best,
Justus