[2834] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Kerberos non-repudiation idea

daemon@ATHENA.MIT.EDU (Jim Miller)
Mon Oct 4 19:18:11 1993

From: jim@bilbo.suite.com (Jim Miller)
Date: Mon, 4 Oct 93 17:03:58 -0500
To: don@gza.com
Cc: kerberos@MIT.EDU
Reply-To: Jim_Miller@suite.com


Don Davis <don@gza.com> wrote:

> i don't think this notary function should be part of the
> kerberos server's responsibility. 

> 


Why not?  It seems to me to be the natural place for it.  Or am I missing  
something?

I should probably state an important assumption of mine.  It is: In the system  
described in my original "Kerberos non-repudiation idea" post, I assume the  
majority of authenticated messages will *not* also be signed messages.



> actually, kinit already can be the mechanism for
> certificates' issuance, because certificates are just
> long-lived tgts, anyway.  

> 


I agree they are quite similar, though some of the ticket-specific fields would  
have to be interpreted differently.



> here, your "nonce" seems to offer little if any extra
> security;

This surprises me a little, though I admit that I'm no cryptographer.  The  
original intent for including the XOR step was to have a cheap way to make it  
more difficult to perform a brute force search for the key used to encrypt a  
message signature.  The XOR step was supposed to transform the known  
"plaintext" message hash into "random plaintext".  I'm assuming it's more  
difficult to do brute force searching if the target plaintext is random bits.   
How do you know when you've found the key?



> > It is now possible for a recipient to re-authenticate the
> > origin of an archived message, even after the sender's
> > certificate has become compromised.
> > 

> it's not as simple as this, because the recipient needs to
> know that this archival signature is itself authentic,
> because its contents are hidden from the recipient. this
> is straightforward to fix, though.
> 


Good point.  I hadn't considered this.



> your efficiency improvements are ones i knew about
> already, so i certainly believe they're secure.

It was never my intention to critique your Private-Key Certificate  
Authentication mechanism.  I just mentioned it to show where I was getting the  
private-key certificate idea from.



> of your ideas, my favorite is the signed hash of the
> message archive; i had believed that a compromised
> translator key would inevitably invalidate old
> signatures. 

> 


Too bad I can't take full credit for it.  The Digital Timestamp people from  
Bellcore described something like this at this year's RSA Data Security  
conference.  Actually, what they described was a mechanism for retaining the  
integrity of their long-term Timestamps (MD-like hashes) even after computer  
technology advanced to the point where the hashing algorithms became insecure.   
Their solution:  Occasionally imbed a hash of your old Timestamps inside a new  
Timestamp that is created using a better hashing algorithm.  (They're assuming  
that better hashing algorithms will appear sooner than better computer  
technology.  A safe assumption, I think.)


My favorite idea is that the message signature mechanism allows you to do most  
of the work of a transaction in parallel with the validation of the message  
signature.


Jim_Miller@suite.com



home help back first fref pref prev next nref lref last post