Re: [openpgp] "SHA-1 is a Shambles" and forging PGP WoT signatures

Marcus Brinkmann <marcus.brinkmann@rub.de> Sat, 25 January 2020 01:15 UTC

Return-Path: <marcus.brinkmann@rub.de>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4A281200E9 for <openpgp@ietfa.amsl.com>; Fri, 24 Jan 2020 17:15:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rub.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OnMTZS0BYUW5 for <openpgp@ietfa.amsl.com>; Fri, 24 Jan 2020 17:15:56 -0800 (PST)
Received: from out3.mail.ruhr-uni-bochum.de (out3.mail.ruhr-uni-bochum.de [134.147.53.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 219291200F3 for <openpgp@ietf.org>; Fri, 24 Jan 2020 17:15:56 -0800 (PST)
Received: from mx3.mail.ruhr-uni-bochum.de (localhost [127.0.0.1]) by out3.mail.ruhr-uni-bochum.de (Postfix mo-ext) with ESMTP id 484J3r35kRz8S8X; Sat, 25 Jan 2020 02:15:52 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=rub.de; s=mail-2017; t=1579914952; bh=0SW8l90TsthGrX1qQKPG3Km/NlJfZ3HkhnZLcHyND90=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=FqOo0DvsaInS0/KgGjuhFpNCiTpg99Opntt3dDpzRekb+BLxLqlNGKZjCazhDGBDw LifWRUJbbPO3rZfloy//lYwIj+35yHvVrqVUtinJyMwQT8SgNcBpuVnIhOU4XpyzaR SLwLczt+bxMLtSaH6XLZq4F8phCxHWEDmGljXbFU=
Received: from out3.mail.ruhr-uni-bochum.de (localhost [127.0.0.1]) by mx3.mail.ruhr-uni-bochum.de (Postfix idis) with ESMTP id 484J3r1Z4Jz8S8H; Sat, 25 Jan 2020 02:15:52 +0100 (CET)
X-Envelope-Sender: <marcus.brinkmann@rub.de>
X-RUB-Notes: Internal origin=134.147.42.227
Received: from mail1.mail.ruhr-uni-bochum.de (mail1.mail.ruhr-uni-bochum.de [134.147.42.227]) by out3.mail.ruhr-uni-bochum.de (Postfix mi-int) with ESMTP id 484J3q5wBWz8S7X; Sat, 25 Jan 2020 02:15:51 +0100 (CET)
Received: from [192.168.142.139] (p5DCA4A2E.dip0.t-ipconnect.de [93.202.74.46]) by mail1.mail.ruhr-uni-bochum.de (Postfix) with ESMTPSA id 484J3q1fH1zyb9; Sat, 25 Jan 2020 02:15:51 +0100 (CET)
To: Michael Richardson <mcr@sandelman.ca>, Damien Goutte-Gattat <dgouttegattat@incenp.org>
Cc: Kai Engert <kaie@kuix.de>, openpgp@ietf.org
References: <d8321b24-8836-2702-6b01-242b4cab932f@rub.de> <e4dc8c25-2282-17a8-7e64-cee55f43be84@kuix.de> <20200124002228.ek7bcwlbghuoborr@dynein.local.incenp.org> <24969.1579885029@localhost>
From: Marcus Brinkmann <marcus.brinkmann@rub.de>
Message-ID: <11771a85-231f-8a67-63e2-41b857f5d853@rub.de>
Date: Sat, 25 Jan 2020 02:15:51 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0
MIME-Version: 1.0
In-Reply-To: <24969.1579885029@localhost>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: clamav-milter 0.99.4 at mail1.mail.ruhr-uni-bochum.de
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/mEm6AK_gw0s2OORsOrLJVxbx4So>
Subject: Re: [openpgp] "SHA-1 is a Shambles" and forging PGP WoT signatures
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Jan 2020 01:15:59 -0000

Hi,

On 1/24/20 5:57 PM, Michael Richardson wrote:
> 
> Damien Goutte-Gattat <dgouttegattat@incenp.org> wrote:
>     > What Marcus says the author *could* have done is to generate the two keys A
>     > and B in such a way that they also have the same fingerprint. They have
>     > not
> 
> I'm not convinced that there are enough under-determined bytes that can be
> mutated in the content that goes into making the fingerprint.
> AFAIK, it's just the key.
> 
> I guess, maybe if the key is big enough (rsa 8K, bigger), that the bytes
> could be in the prime itself.  Are you saying that?  If so, I wonder what the
> smallest key for which this is true is.

The authors demonstrate a collision block within a RSA 6144 bit public
key.  The collision happens at the first 6056 bits of the modulus, and
the remaining 88 bits are used to make a valid modulus for the public
exponent, which is fixed at 2^16+1.

Thanks,
Marcus




-- 
Dipl.-Math. Marcus Brinkmann

Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
Universitätsstr. 150, Geb. ID 2/461
D-44780 Bochum

Telefon: +49 (0) 234 / 32-25030
http://www.nds.rub.de/chair/people/mbrinkmann