Re: Off-the-record [Was: ID theft (offtipicish), but is now more on topic]

2007-02-05 Thread Oded Arbel
On Mon, 2007-02-05 at 17:55 +0200, Peter wrote:
 On Mon, 5 Feb 2007, Alon Altman wrote:
 
  On Mon, 5 Feb 2007, Oded Arbel wrote:
  
  It seems like they claim both deniability and and assurance (which is
  what you get from signing, except w/o the signing part) at the same
  time.
 
   I think that the trick is to give the other party the signing key right
  after you signed the message.
 
 The usual trick with just-on-time crypto like that is to use a 
 public/private key system to generate and exchange a unique key to be 
 used just for that session, and then destroy it.

Problem - it maintains authentication across sessions: when at first I
talk with someone, I get a crypto thumbprint that I need to verify
manually that it belongs to the person I'm supposed to be talking (for
example - by phone). After I do that once, whenever I talk with the same
person, I am assured that its the same person. 

That doesn't work with simple session only encryption, and what I don't
understand is how they both offer assurance and deniability, if the next
time I'm talking with the same guy I can be assured of his identity but
he can later claim that it wasn't him.

--
Oded
::..
It's sort of a threat, you see.  I've never been very good at them
myself, but I'm told they can be very effective.



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Re: Off-the-record [Was: ID theft (offtipicish), but is now more on topic]

2007-02-05 Thread Oded Arbel
On Mon, 2007-02-05 at 21:24 +0200, Peter wrote:
 On Mon, 5 Feb 2007, Oded Arbel wrote:
 
  That doesn't work with simple session only encryption, and what I don't
  understand is how they both offer assurance and deniability, if the next
  time I'm talking with the same guy I can be assured of his identity but
  he can later claim that it wasn't him.
 
 Think about how the unique session key is generated: a pubilc key 
 exchange occurs, with or without second factor authentication (on the 
 phone as you said), then a session key is generated and used based on 
 this. The session key is used only once and then destroyed. The next 
 time you connect you cannot in theory know that you are talking to the 
 same person without using the second factor again imho (otherwise you 
 are relying on communication possibly crypted with a private public key 
 sent during the second factor communication). Deniability relies on both 
 sides destroying the session keys immediately after use, the server not 
 storing or saving any. After the fact, only a lie detector can find out 
 if you did talk to the other guy. Of course anybody having run a packet 
 sniffer all the time on either connection (and having listened in on the 
 phone) will only pretend to be using the lie detector since he already 
 knows what he needs to know.

You seem to imply that with off-the-record, both a third party that has
access to the entire session can prove the identity of at least one side
of it (destroying deniability) and that on a second session one cannot
be assured of the identity of the other person w/o again performing
manual verification (destroying authentication). 
So you are essentially calling the OTR guys liars, right ?

--
Oded
::..
He looked a lot bigger when I didn't see him
-- Jayne (Adam Baldwin), Firefly



=
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word unsubscribe in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]