On 02/28/2013 04:14 PM, [email protected] wrote:
On Wed, 27 Feb 2013, Jon Kristensen wrote:

However, I still don't understand when the revealing of the MAC keys is useful. If Eve does not manage to decrypt the ciphertext, the text cannot be used to prove anything. If Eve does manage to acquire or guess the encryption key, she will also have the MAC key (as the MAC key is a simple derivation of the encryption key), and thus the power to forge the transcript.

What would we lose by not posting the MAC keys over the wire?

With the MAC keys you can fake messages _in the past_

So while you won't be fooled in your _current_ conversation, no one can
later produce logs to claim you said something, as _anyone_ who captured
the MACs could forge message (for the past!) as you or your conversation
partner.

Paul

Paul,

Thank you for your reply, but I still don't see how this helps. I don't see how anyone could claim that I would have said something even without the MAC keys. The only way to decrypt our message is to have the encryption key. And if Eve has the encryption key, she also has the MAC key.

So I ask again: What would we lose by not posting the MAC keys over the wire?

Actually, when I think about it, there seems to be a potential drawback with exposing the MAC keys: If Eve have the MAC key (for example, as revealed over the wire), and an encryption key which seems to decrypt the message, that should pretty much prove that the encryption key in question is actually the key that was used, as the probability of the same MAC key being derived from another encryption key is extremely low.

Jon
_______________________________________________
OTR-dev mailing list
[email protected]
http://lists.cypherpunks.ca/mailman/listinfo/otr-dev

Reply via email to