[15796] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: dual-use digital signature vulnerability

daemon@ATHENA.MIT.EDU (Sean Smith)
Sun Jul 18 22:52:44 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <6.1.2.0.2.20040718105710.03d7ba80@mail.comcast.net>
From: Sean Smith <sws@cs.dartmouth.edu>
Date: Sun, 18 Jul 2004 22:08:25 -0400
To: cryptography@metzdowd.com

>
> it isn't sufficient that you show there is some specific 
> authentication protocol with unread, random data ... that has 
> countermeasures against a dual-use attack ... but you have to 
> exhaustively show that the private key has never, ever signed any 
> unread random data that failed to contain dual-use countermeasure 
> attack.
>

Why isn't it sufficient?   (Quick: when was the last time anyone on 
this list authenticated by signing unread random data?)

The way the industry is going, user keypairs live in a desktop 
keystore, and are used for very few applications.  I'd bet the vast 
majority of usages are client-side SSL, signing, and encryption.

If this de facto universal usage suite contains exactly one 
authentication protocol that has a built-in countermeasure, then when 
this becomes solid, we're done.

Our energy would be better spent on the real weaknesses: such as the 
ease of getting desktops to just cough up the private key, or to use it 
for client-side SSL without ever informing the user.

And on the real problems: such as using the standard suite to get the 
trust assertions to match the way that trust really flows in the real 
world.

--Sean

















---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post