[19499] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[camera_lumina@hotmail.com: Tor-stored Pads]

daemon@ATHENA.MIT.EDU (Eugen Leitl)
Tue Jan 3 13:43:33 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 2 Jan 2006 13:08:58 +0100
From: Eugen Leitl <eugen@leitl.org>
To: Cryptography List <cryptography@metzdowd.com>


--zF+wQuhOjuULIEKq
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

----- Forwarded message from Tyler Durden <camera_lumina@hotmail.com> -----

=46rom: Tyler Durden <camera_lumina@hotmail.com>
Date: Sun, 01 Jan 2006 21:41:35 -0500
To: measl@mfn.org
Cc: coderman@gmail.com, jya@cryptome.net, cypherpunks@jfet.org
Subject: Tor-stored Pads

Alif the Terrible wrote...

>(3) Since all off the pieces have been stored - including both the
>encrypted messagetexts and the decryptors, what is to prevent a
>time-faking attack against this message?  After all, if you have all the
>parts, you can just "reinstantiate" the network as it was was the messages
>were originally sent.

Yes, agreed, but I think this a MUCH bigger pain in the ass.
To wit: If they grab and deencrypt the "message" (ie the piece sent to the=
=20
receiver) prior to the expiration time, then they will have the message and=
=20
be able to read it. This is an improvement in that they have to do it prior=
=20
to the expiration time of the hidden piece. They can not grab and store thi=
s=20
piece alone because the other piece will not be there later.

If they do not deencrypt the message in time, then they have to grab a core=
=20
dump of the entire network (as well as the transmitted message), because=20
they do not know where the piece is located. Seems to me that's a much=20
harder thing to do then merely grabbing a sole message and de-encrypting it=
=20
at their leisure. Seems to me too that a Tor network that was sufficiently=
=20
dynamic could require network core dumps that could actually tax even NSA=
=20
facilities, given large Tor networks of the future.

It should also be pointed out that if the encryption on the "message" piece=
=20
is done extremely carefully, one can afford to be lax on the Tor piece, and=
=20
yet have a very difficult problem to crack (particularly if wrong guesses=
=20
set off boobytraps that kill the hidden message piece).

Again, it can be countered that an attack might merely require N=20
instantiations of the network, but now we are talking some very significant=
=20
resources. We've multiplied the originall cracking problem by N. Perhaps.

-TD

PS: I believe this is very close to having a one-time stored pad, but the=
=20
difference with traditional Pads is that this one is tored in an anonymous=
=20
location.(See Coderman's post.)

----- End forwarded message -----
--=20
Eugen* Leitl <a href=3D"http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

--zF+wQuhOjuULIEKq
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDuRfadbAkQ4sp9r4RAqZsAJ9xsZmawW34toEMsemjm7uruIm9mACguEo4
YGY804at3kjDSCzaCjx+xy4=
=XfC/
-----END PGP SIGNATURE-----

--zF+wQuhOjuULIEKq--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post