[8252] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: migration paradigm (was: Is PGP broken?)

daemon@ATHENA.MIT.EDU (Ray Dillinger)
Mon Dec 11 01:02:03 2000

Date: Sun, 10 Dec 2000 10:56:27 -0800 (PST)
From: Ray Dillinger <bear@sonic.net>
To: Enzo Michelangeli <em@who.net>
Cc: cryptography@c2.net
In-Reply-To: <008101c06295$3aff6880$6000a8c0@em>
Message-ID: <Pine.LNX.4.21.0012101049300.9244-100000@bolt.sonic.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII



On Sun, 10 Dec 2000, Enzo Michelangeli wrote:

>> A more important problem with passphrase-based keys is collisions -
>> two people picking wimpy passwords can end up with the same keys.
>
>Salt should take care of this (as well as reducing the effectiveness
>of dictionary attacks).

There are times and places where you can use salt, and times and places 
where you can't.  In order to use salt with a passphrase, you have to 
store it somewhere.  And that means that a person who has only the 
ciphertext and the passphrase cannot decrypt.  If you use salt, then 
the ciphertext can be decrypted only in an environment where that 
particular salt is available.  That makes it nearly useless for 
networks or backups.

				Bear




home help back first fref pref prev next nref lref last post