Re: [openpgp] Followup on fingerprints

Derek Atkins <warlord@MIT.EDU> Tue, 04 August 2015 13:17 UTC

Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F4B41A90DE for <openpgp@ietfa.amsl.com>; Tue, 4 Aug 2015 06:17:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AhCK7hfhuNMq for <openpgp@ietfa.amsl.com>; Tue, 4 Aug 2015 06:17:09 -0700 (PDT)
Received: from mail2.ihtfp.org (mail2.ihtfp.org [IPv6:2001:4830:143:1::3a11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 759C71A9145 for <openpgp@ietf.org>; Tue, 4 Aug 2015 06:16:57 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 759C4E2035; Tue, 4 Aug 2015 09:16:56 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 16232-04; Tue, 4 Aug 2015 09:16:52 -0400 (EDT)
Received: from securerf.ihtfp.org (unknown [IPv6:fe80::ea2a:eaff:fe7d:235]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (verified OK)) by mail2.ihtfp.org (Postfix) with ESMTPS id 7D2A0E2034; Tue, 4 Aug 2015 09:16:52 -0400 (EDT)
Received: (from warlord@localhost) by securerf.ihtfp.org (8.14.8/8.14.8/Submit) id t74DGqJb016151; Tue, 4 Aug 2015 09:16:52 -0400
From: Derek Atkins <warlord@MIT.EDU>
To: Nicholas Cole <nicholas.cole@gmail.com>
References: <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com> <87zj2ecmv8.fsf@alice.fifthhorseman.net> <CAMm+LwgKmcTes=V7uS3MjCQixWCo-i7PY=VE7eCHSqt3Ho3OSg@mail.gmail.com> <87a8udd4u6.fsf@alice.fifthhorseman.net> <sjm61503182.fsf@securerf.ihtfp.org> <CAMm+LwgEVySpfL-iN2uzX-4tu7R+isDkHE9D8uAeLTxxd4VxqQ@mail.gmail.com> <sjmwpxc1kbv.fsf@securerf.ihtfp.org> <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com> <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org> <20150803173231.GG3067@straylight.m.ringlet.net> <2439a89a6c4eb70044e144406a732482.squirrel@mail2.ihtfp.org> <87io8v7uqt.fsf@littlepip.fritz.box> <87h9of7p0e.fsf@littlepip.fritz.box> <87wpxbtuwk.fsf@vigenere.g10code.de> <CAAu18hez49oVhTwRLqv=3rifbg5q5+EqsSvBO0c-ezq+M_Qmyw@mail.gmail.com>
Date: Tue, 04 Aug 2015 09:16:52 -0400
In-Reply-To: <CAAu18hez49oVhTwRLqv=3rifbg5q5+EqsSvBO0c-ezq+M_Qmyw@mail.gmail.com> (Nicholas Cole's message of "Tue, 4 Aug 2015 09:05:03 +0100")
Message-ID: <sjmfv3zyz0b.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/xbmdsTdIDdWp8_Wn-_35ORVUoIo>
Cc: IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2015 13:17:11 -0000

Nicholas Cole <nicholas.cole@gmail.com> writes:

> On Tuesday, 4 August 2015, Werner Koch <wk@gnupg.org> wrote:
>
>     On Tue,  4 Aug 2015 04:42, look@my.amazin.horse said:
>    
>     > And the actual attack is "slightly weaker non-repudiation"?
>    
>     ... when using a truncated fingerprint.
>    
>     Why should anyone truncate a fingerprint from 20 bytes to 13 bytes?
>     This is an arbitrary value in between the known weak 8 byte keyids and
>     the full 20 byte fingerprints for which we expect that in our lifetime
>     collisions can be 
>
> I'm really struggling to follow what is going on with this whole discussion! 
> Fingerprints need to be robust enough that creating aritrary collisions is not
> feasible. That has always been central to OpenPGP.  If that creates headaches
> for user interfaces then we will have to find ways to deal with that, but that
> is a separate discussion. 
>
> I thought that there were some well established, secure as far as anyone
> knows, hash algorithms. We've many years experience of the problems of
> including or not including various extra bits of information along with the key
> material itself, so doesn't the WG just need to pick one of the candidate
> algorithms and have done with it?  

Every hash algorithm is going to have collisions.  In an ideal hash you
can find a collision in 2^(N/2) trials where N is the number of bits in
the hash.  If you truncate the hash then that reduces N.  In non-ideal
hashes it's less effort.

> openpgp mailing list
> openpgp@ietf.org
> https://www.ietf.org/mailman/listinfo/openpgp

-derek
-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available