[openpgp] Re: Deterministic generation of (symmetric) public key params from private key params
Daniel Huigens <d.huigens@protonmail.com> Thu, 14 November 2024 23:34 UTC
Return-Path: <d.huigens@protonmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 501D7C151061 for <openpgp@ietfa.amsl.com>; Thu, 14 Nov 2024 15:34:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=protonmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id akRL9OH3Kqav for <openpgp@ietfa.amsl.com>; Thu, 14 Nov 2024 15:34:42 -0800 (PST)
Received: from mail-40133.protonmail.ch (mail-40133.protonmail.ch [185.70.40.133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DEAEC14F686 for <openpgp@ietf.org>; Thu, 14 Nov 2024 15:34:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1731627279; x=1731886479; bh=F5ChUlrnKM4EkO502LBf9b5NrNoaC/lieD0/oEhWxFs=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=dyhmWMBL5ua5NB3ncaAZmZ9Jaig3mua5wWgyri+ug46Nx7nOz1o4mCpahBPk0zJgN EL8gH9XzsfydCIEPsg0yCYh6nLWjJLMuUISQVqC/+NP4DGjbLsgiKr5pS8iaDpYndA mivtYDoOAV8PxszIOyyI/PJRLxDcfoyfSPHMuIfBggnsVGCOV/dIRQZuFYAL3pXeC2 QjGbKGHZR5X/LZYebZKGjzvU8C7+UCEq+/vT/Aarme/5fTkZJ7wZa4FC42gnuIOWEI sqmt/ooHAU28zdaiVQa5oj/YMYKfj8LJgrGuSNSCs2MG5OO4NZVEneCbPMj85Wps5K 0fof62SJyjn4g==
Date: Thu, 14 Nov 2024 23:34:36 +0000
To: vedaal@nym.hush.com
From: Daniel Huigens <d.huigens@protonmail.com>
Message-ID: <tde6Vo5k0K8fRhFsvzp0sMvTwVCaCOOhqB9-vRviwieBWeonc5y4y-iZHPi6ib409k1Nj0u6j3znIIKFotbdAa-Cqa4pNb8fx9wMgxUk4GE=@protonmail.com>
In-Reply-To: <2f50dbea1fffe1b0ce159da0f80ba661f41b9216efbc0ee1@smtp.hushmail.com>
References: <FxKXcgs81L4JQJjqV8sB_941ghtKVj5cjVYx6povy95enL27NdtRWhG5cLgElc9jJXQRqFqbTroNYlSL1agjgDVfRTmKJtKVwJkC0U1PmS8=@protonmail.com> <87a5e3xmba.fsf@europ.lan> <prYwCJCeUbCUx9PF-bWdQf-DpImAj18NQ9VhjOH0NpT-6WFmO_4JHrmI-2x0laDmEKjVVEif6GPZJa4rhz64k8-2-aZW6Og03YG6RLeGtfA=@protonmail.com> <877c95yg9q.fsf@europ.lan> <2f50dbea1fffe1b0ce159da0f80ba661f41b9216efbc0ee1@smtp.hushmail.com>
Feedback-ID: 2934448:user:proton
X-Pm-Message-ID: ca761c2c1b74b4767b0198d04dcc44cfdbc9c94d
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1=_sFVefPzoPlWzLfXn8ohsdVDqcQkYPopfRmtyksXRroQ"
Message-ID-Hash: CIMFGZZ22A4H6QGKRXBTSRRQZRTEB7TK
X-Message-ID-Hash: CIMFGZZ22A4H6QGKRXBTSRRQZRTEB7TK
X-MailFrom: d.huigens@protonmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Justus Winter <justus@sequoia-pgp.org>, openpgp <openpgp@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Deterministic generation of (symmetric) public key params from private key params
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/ra3pa-Kdx3xaJAqeW1j3CjFSY6M>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
Hi Vedaal, To be fair, a well-funded adversary creating 2^64 symmetric keys by themselves would not, by itself, create any issue. There is a 50% chance that two of the keys that the adversary generated share the same private key material, but there is not a 50% chance that the adversary shares a private key with anyone else, unless there are also very many keys with the same timestamp generated by legitimate users/"targets". To find the same private key as any one specific user with a specific timestamp with 50% probability, the adversary would still have to generate 2^127 private keys, which is obviously not feasible. However, I do think it would be a surprising restriction if we have to say that an OpenPGP deployment is not allowed to use a hardcoded key generation timestamp (for privacy or other reasons), and so relying on that timestamp changing (for legitimate users) does feel a bit sketchy, although it's probably fine in practice. Best, Daniel On Thursday, November 14th, 2024 at 18:45, vedaal@nym.hush.com <vedaal@nym.hush.com> wrote: > On 11/14/2024 at 10:41 AM, "Justus Winter" <justus@sequoia-pgp.org> wrote: > >> Interesting. What about also hashing in the other metadata (i.e. the >> timestamp). Then, the problem arises only if you have 2^64 users >> creating a symmetric key at the exact same time >> >> ===== >> >> GnuPG allows for a 'fake time' where any time can be listed. >> >> So, theoretically, a well-funded, well resourced adversary, can create 2^64 symmetric keys with the same timestamp. >> >> vedaal
- [openpgp] Deterministic generation of (symmetric)… Daniel Huigens
- [openpgp] Re: Deterministic generation of (symmet… Justus Winter
- [openpgp] Re: Deterministic generation of (symmet… Daniel Huigens
- [openpgp] Re: Deterministic generation of (symmet… Simo Sorce
- [openpgp] Re: Deterministic generation of (symmet… Justus Winter
- [openpgp] Re: Deterministic generation of (symmet… Daniel Huigens
- [openpgp] Re: Deterministic generation of (symmet… vedaal
- [openpgp] Re: Deterministic generation of (symmet… Daniel Huigens