On 11/4/05, Travis H. <[EMAIL PROTECTED]> wrote:
> By my calculations, it looks like you could take a keypair n,e,d and
> some integer x and let e'=e^x and d'=d^x, and RSA would still work,
> albeit slowly.  Reminds me of blinding, to some extent, except we're
> working with key material and not plaintext/ciphertext.

Your point would be to make the encryption key very large?
Unfortunately, making it large enough to present any kind of challenge
to an attacker who is plucking files off a trojaned computer would
make it far too large to be used, with this system.

> Since I'm on the topic, does doing exponentiation in a finite field
> make taking discrete logarithms more difficult (I suspect so), and if
> so, by how much?

This doesn't make sense. The discrete log operation is the inverse of
exponentiation. Doing exponentiation is a prerequisite for even
considering discrete log operations. Hence it cannot make them "more
difficult".

> Is there any similar property that could be used on e' and d' to make
> computing e and d more difficult?  Of course whatever algorithm is
> used, one would need to feed e' and d' to it en toto, but a really
> clever attacker might be able to take the xth root prior to
> exfiltrating them.

That's a new word to me. What is your goal here, to make something
that is "even stronger" than RSA? Or is it, as in the context of this
thread, to inflate keys, making them bigger so that an attacker can't
download them easily?

> Also, application of a random pad using something like XOR would be
> useful; could be done as a postprocessing stage independently of the
> main algorithm used to encrypt the data, or done as a preprocessing
> stage to the plaintext.  I prefer the latter as it makes breaking the
> superencryption much more difficult, and fixed headers in the
> ciphertext could give away some OTP material.  However, the
> preliminary encryption in something like gpg would suffer, so it would
> have the effect of making the ciphertext bigger.  Perhaps this is an
> advantage in your world.

That's not feasible in most cases. If you really have a OTP handy, why
are you bothering with RSA? Or are you planning to use it as a
two-time-pad? That generally doesn't work well. (The fact that you are
worried about "giving away" OTP material is not a good sign!)

> An alternate technique relies in specifying, say, 256 bits of key,
> then using a cryptographically strong PRNG to expand it to an
> arbitrary length, and storing that for use.  Pilfering it then takes
> more bandwidth, but it could be reconstructed based on the 256-bit
> seed alone, if one knew the details of the PRNG.  So the key could be
> "compressed" for transfer, if you know the secret seed.  Search for
> the seed would still be expensive, even if PRNG details are known.

So where do you store this 256 bit seed? You want to distract the
attacker with the smoke and mirrors of the big file for him to
download, hoping he will ignore this little file which is all he
really needs? I think we are assuming the attacker is smarter than
this, otherwise you could just use regular key files but give them
obscure names.

> Alternately, in a message encrypted with gpg-like hybrid ciphering,
> one could apply a secret, implicit PRNG to the message key seed before
> using it as a symmetric key.  For example, you could take a 256-bit
> message key, run it through the PRNG, create 3x256 bits, then use
> triple-AES to encrypt the message.  In this case, the PRNG buys
> forgery resistance without the use of PK techniques.  The PRNG
> expander could not be attacked without breaking the PK encryption
> (which supports arbitrarily large keys) of the seed or the triple-AES
> symmetric encryption of the message.

What is forgery resistance in this context? A public key encryption
system, by definition, allows anyone to create new encrypted messages.

Your technique is complicated but it is not clear how much security it
adds. Fundamentally it is not too different from RSA + counter mode,
where CTR can be thought of as a PRNG expanding a seed. This doesn't
seem to have anything to do with the thread topic. Are you just
tossing off random ideas because you don't think ordinary hybrid RSA
encryption is good enough?

> You know, they specify maximum bandwidth of covert channels in bits
> per second, I wonder if you could use techniques like this to prove
> some interesting property vis-a-vis covert channel leakage.  It's
> remarkably difficult to get rid of covert channels, but if you inflate
> whatever you're trying to protect, and monitor flows over a certain
> size, then perhaps you can claim some kind of resilience against them.
> *shrug*

I'm not sure conventional covert-channel analysis is going to be that
useful here, because the bandwidths we are looking at in this attack
model are so much greater (kilobytes to megabytes per second). But
broadly speaking, yes, this was Daniel Nagy's idea which started this
thread, that making the key files big enough would make it more likely
to catch someone stealing them because it would take so long.

CP

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to