On 12/17/2013 9:20 PM, Daniel Kahn Gillmor wrote:
> sigh.  "weakest link" analysis is clearly useful, and just as
> clearly not the only analytic tool to use.

I don't understand your position.  First you're saying, "we currently
have 112 bits of keyspace, we need at least 128," and then you're saying
that you want to see the system evened out -- but the difference between
a 128-bit keyspace and a 256-bit keyspace is so enormous that you might
as well be talking about a 112-bit keyspace and a 256-bit keyspace.

If a 3072-bit key makes you happy and makes you feel it's "evened out,"
well, my question is -- why?  256 bit keyspace versus 112 is not much
different from 256 bit versus 128.

> Your argument in response seems to be "whoa! if we improve them all
> the way to the symmetric cipher length it would be computationally
> infeasible!"

No.  My argument is that your reasoning is incoherent.  If you want to
even out the system -- or, as you advocated later, make the asymmetric
component stronger than the symmetric component -- the *only possible*
interpretation is that you're advocating for at least RSA-15000.  If you
truly believe the asymmetric component should be stronger, you're
advocating for RSA-30000.

I don't think that's what you want.  (And I note that you have
explicitly repudiated that notion.)  And since I think that's not what
you want, that means I have to conclude your reasoning is faulty.

> so, how much weaker are you ok with?

At least 128 bits of keyspace less, obviously.  And when weighed in that
respect, whether we're talking about 128 bits or 140 bits is really
quite irrelevant.

That's why we need to focus on keeping each component at or greater than
our minimum specification.  112 bits of keyspace is a reasonable minimum
for the time being; therefore, I'm happy with the current defaults.  I
don't want to see them used for the next ten years, mind you, but I
absolutely reject the fierce moral urgency of immediate change that you
seem to be subscribing to.

> (i'm glad you still feel they're trustworthy, even in the context of
> them having issued a deliberately bad RNG, and their keylength
> recommendations being weaker than everyone else's!)

That's a naked slander against NIST.  You're better than that, Daniel.

No one, and I emphasize *no one*, has presented any evidence that NIST
issued a deliberately bad PRNG, or for that matter whether Dual_EC_DRBG
is even backdoored.  _Wired_ magazine wrote of it,

        A surprising uncertainty is still smouldering over
        whether Dual_EC_DRBG really is backdoored.  The _Times_,
        crypto experts note, hasn't released the memos that
        purport to prove the existence of a backdoor, and the
        paper's direct quotes from the classified documents
        don't mention any backdoor in the algorithm or efforts
        by the NSA to weaken it or the standard.  They only
        discuss efforts to push the standard through committees
        for approval.

        Jon Callas, the CTO of Silent Circle ... saw the
        presentation by Shumow.  He says he wasn't alarmed by
        it at the time and still has doubts that what was
        exposed was actually a backdoor, in part because the
        algorithm is so badly done.  "If [NSA] spent $250
        million weakening the standard and this is the best
        that they could do, then we have nothing to fear from
        them," he says.  "Because this was really ham-fisted.
        When you put on your conspiratorial hat about what the
        NSA would be doing, you would expect something more
        devious, Machiavellian... and this thing is just
        laughably bad.  This is Boris and Natasha sort of
        stuff."

        Indeed, the Microsoft presenters themselves -- who
        declined to comment for this article -- didn't press
        the backdoor theory in their talk.  They didn't mention
        NSA at all, and went out of their way to avoid accusing
        NIST of anything.  "WE ARE NOT SAYING: NIST
        intentionally put a back door in this PRNG," read the
        last slide of their deck.

        The Microsoft manager who spoke with WIRED on
        condition of anonymity thinks the provocative title of
        the 2007 presentation overstates the issue with the
        algorithm and is being misinterpreted -- that perhaps
        reporters at the _Times_ read something in a classified
        document showing that the NSA worked on the algorithm
        and pushed it through the standards process, and quickly
        took it as proof that the title of the 2007 talk had
        been right to call the weakness in the standard and the
        algorithm a backdoor.

        ...

        [Schneier] adds that the uncertainty around the algorithm
        and the standard is the worst part of the whole matter.

        "This is the worst problem that the NSA has done,"
        Schneier says.  "They have so undermined the fundamental
        trust in the internet, that we don't know what to trust.
        We have to suspect everything.  We're never sure.  That's
        the greatest damage."

(Link: http://www.wired.com/threatlevel/2013/09/nsa-backdoor/all/ )

I emphatically agree there's a lot of uncertainty around Dual_EC_DRBG.
It is possible it was subverted -- but it's also possible it wasn't.
It's possible it was subverted, NIST knew of the subversion, and
approved the standard anyway -- but it's also possible NIST was caught
unawares.  It's possible that... etc.

Claiming that they offered a *deliberately bad* PRNG is, quite frankly,
a slander.  There is no certainty there.  There isn't even much in the
way of evidence.  There is a possibility.  Let's not go about declaring
NIST guilty based on nothing more than the possibility of wrongdoing.

> Of course when ECC is available, we may want to shift to ECC.  But
> ECC is not currently available, and even when it becomes available,
> RSA will be the dominant key type for years.

Sure.  That's because we can't retroactively change keys that have
already been made.  Even if we adopt your recommendation of moving to
RSA-3072 immediately, RSA-2048 will still be the dominant key type for
years.

> This is a terrible argument for not improving the default RSA key
> length today.

I think it's a great one.  One of the best things about GnuPG has been
its stability.  Changing the defaults is not something to be done
lightly.  Doing so invalidates FAQs and tutorials, it forces people to
edit their scripts, it causes uncertainty and doubt and "why did you
change...?" on the mailing lists.  Changing to RSA-3072 now, and then to
ECC in nine months or a year, is (IMO) unwise.  "Why are you changing
the defaults again?  Did you make a mistake the last time?"

Etc., etc.  Better to wait until ECC is ready, make a single change to
the defaults, and keep the transition crisp and clean.

> It costs very little to change the default, and it signals the user
> community that we take the existence of well-funded adversaries 
> seriously.

I think GnuPG has already clearly established its reputation in that field.

> We're engineers talking about building safety and security 
> infrastructure here.

Yes -- and part of that is recognizing when the additional expense to
mitigate a risk is greater than the risk itself.  I'm sure we could
reduce airplane crashes by 90% if we were to overengineer airplanes so
much that a ticket cost a million dollars, but we don't do that.

You want perfection.  You're not going to get it.  It's like trying to
build a bridge that simply will not collapse, period, no matter how
large a weight is moved over it.

What I want instead is a quality bridge, one that's well-inspected, and
has a big sign a half-kilometer out reading, "Maximum Load 10,000kg".
That, we can do pretty easily.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to