Re: How to Calculate Signatures?

Konrad Rosenbaum <konrad@silmor.de> Sun, 03 April 2005 18:04 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA14975 for <openpgp-archive@lists.ietf.org>; Sun, 3 Apr 2005 14:04:41 -0400 (EDT)
Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id j33HmUaC047323; Sun, 3 Apr 2005 10:48:30 -0700 (PDT) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id j33HmUu3047322; Sun, 3 Apr 2005 10:48:30 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from p15139323.pureserver.info (silmor.de [217.160.219.75]) by above.proper.com (8.12.11/8.12.9) with ESMTP id j33HmTFe047313 for <ietf-openpgp@imc.org>; Sun, 3 Apr 2005 10:48:29 -0700 (PDT) (envelope-from konrad@silmor.de)
Received: from p548c9f4c.dip.t-dialin.net ([84.140.159.76] helo=zaphod.local) by p15139323.pureserver.info with asmtp (Exim 3.35 #1 (Debian)) id 1DI9Cx-0000Ls-00 for <ietf-openpgp@imc.org>; Sun, 03 Apr 2005 19:48:23 +0200
From: Konrad Rosenbaum <konrad@silmor.de>
To: ietf-openpgp@imc.org
Subject: Re: How to Calculate Signatures?
Date: Sun, 03 Apr 2005 19:48:18 +0200
User-Agent: KMail/1.7.2
References: <20050402201614.31E9157EE9@finney.org> <425005AE.5030105@algroup.co.uk> <42501CD7.4070005@algroup.co.uk>
In-Reply-To: <42501CD7.4070005@algroup.co.uk>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="nextPart1268253.Hopp9c9hf8"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Content-Transfer-Encoding: 7bit
Message-Id: <200504031948.22079@zaphod.konrad.silmor.de>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Sunday 03 April 2005 18:41, Ben Laurie wrote:
> Oh, yes. This left me with an unresolved issue: how does one use
> SHA{256,384,512} with DSA (which requires a 160 bit hash).

Simple: you don't. DSA was designed to be used with SHA-1, which is 160 bit. 
Since SHA-1 is theoretically broken (practically will probably follow in a 
few months) one should see what the NIST makes of it. Supplanting a broken 
hash with another hash doesn't make much sense with DSA, since it does not 
contain the ID of the hash (as PKCS#1 does for RSA) - so any attacker could 
find a collission with the broken hash and then simply change the hash ID 
in the signature packet.


	Konrad