Re: [openpgp] Followup on fingerprints

Vincent Breitmoser <look@my.amazin.horse> Wed, 29 July 2015 23:34 UTC

Return-Path: <look@my.amazin.horse>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D077D1B2FD6 for <openpgp@ietfa.amsl.com>; Wed, 29 Jul 2015 16:34:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.001
X-Spam-Level:
X-Spam-Status: No, score=-0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OlLaaiol8d4G for <openpgp@ietfa.amsl.com>; Wed, 29 Jul 2015 16:34:20 -0700 (PDT)
Received: from mail.mugenguild.com (mugenguild.com [5.135.189.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAA341B2FC8 for <openpgp@ietf.org>; Wed, 29 Jul 2015 16:34:15 -0700 (PDT)
Received: from localhost (p5481D1FE.dip0.t-ipconnect.de [84.129.209.254]) by mail.mugenguild.com (Postfix) with ESMTPSA id B44975FAA6; Thu, 30 Jul 2015 01:30:17 +0200 (CEST)
References: <CAMm+LwgTcn8CY+Zk-f9gzXQtMJezG97T+kx2=C7PR5g7zFer_A@mail.gmail.com> <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com>
From: Vincent Breitmoser <look@my.amazin.horse>
To: Phillip Hallam-Baker <phill@hallambaker.com>
In-reply-to: <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com>
Date: Thu, 30 Jul 2015 01:34:09 +0200
Message-ID: <87oaiu7d3i.fsf@littlepip.fritz.box>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/nWXT2UxaiMrtRpOlg5EJySYMHtw>
Cc: IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jul 2015 23:34:23 -0000

On 29 Jul 2015, Phillip Hallam-Baker wrote:
> If we are doing ECC, it is quite practical for someone to generate
> 2^50 keys and then pick the two that match in the first 100
> bits. This can then be used for attacks, particularly if the keys
> are not enrolled in some sort of blockchain.

What sort of attacks are we talking about here?

> The other bit I left out is the idea of compression. The idea here
> being that the person generating the key looks for a fingerprint
> that has 0s for the first n bits. Then the fingerprint starts with a
> version number that says 'the first 32 bits are 0s' or whatever.

What do you mean here by "looks for"? Doesn't this effectively just
limit the bitsize of used fingerprints?

 - V