Re: [openpgp] Version 5 key and fingerprint proposal

Vincent Breitmoser <look@my.amazin.horse> Thu, 09 March 2017 12:41 UTC

Return-Path: <look@my.amazin.horse>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C3F21295A5 for <openpgp@ietfa.amsl.com>; Thu, 9 Mar 2017 04:41:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcDW_-IJDYsq for <openpgp@ietfa.amsl.com>; Thu, 9 Mar 2017 04:41:17 -0800 (PST)
Received: from mail.mugenguild.com (mugenguild.com [5.135.189.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1AE35129438 for <openpgp@ietf.org>; Thu, 9 Mar 2017 04:41:16 -0800 (PST)
Received: from localhost (5.40.111.162.static.user.ono.com [5.40.111.162]) by mail.mugenguild.com (Postfix) with ESMTPSA id 1BD825FB2A for <openpgp@ietf.org>; Thu, 9 Mar 2017 13:41:14 +0100 (CET)
Date: Thu, 09 Mar 2017 13:41:10 +0100
From: Vincent Breitmoser <look@my.amazin.horse>
To: openpgp@ietf.org
Message-ID: <20170309124110.2t3nciyq2lqjjrk7@calamity>
References: <87varlou5m.fsf@wheatstone.g10code.de> <20170307230605.GA2@hashbang.sh> <87efy8ntcx.fsf@wheatstone.g10code.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <87efy8ntcx.fsf@wheatstone.g10code.de>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/s-tksAFUmPrCt4uWpHdoePKXXdg>
Subject: Re: [openpgp] Version 5 key and fingerprint proposal
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Mar 2017 12:41:20 -0000

> > Also, but I likely missed the relevant WG thread, why truncate the
> > fingerprint to 200 bits? (Not that this is likely an issue.)
> 
> That was a suggestion from the Berlin meeting.

Can you (or someone else) give some more insight on the requirements
that were identified as a basis for this suggestion?

The SHA-3 contest reaffirmed that SHA-2 is doing just fine in terms of
cryptanalysis, so 160 bits truncated SHA-2 would be just fine even if we
consider strong collision resistance a requirement. But we had this
topic before, and from what I remember noone was able to come up with an
attack scenario where a collision would be useful in any way. Still the
idea now is to add another 40 bits on top?

 - V