Re: Rebuilding the private key from signatures

2011-02-27 Thread David Shaw
On Feb 24, 2011, at 9:39 AM, Atom Smasher wrote:

> On Thu, 24 Feb 2011, Aaron Toponce wrote:
> 
>> However, I was in a discussion with a friend, and the topic came up that it 
>> is theoretically possible to rebuild your private key if someone had access 
>> to all your signed mail. We debated the size of signatures and mail that 
>> would need to be collected for this to be probable.
>> 
>> Is it?
> =
> 
> if an attacker has two messages signed with DSA, and they happen to use the 
> same value of "k" then it's trivial to recover the private key.
> 
> a random "k" is the achilles heel of DSA and elgamal (and their ECC 
> derivatives). if "k" is truly random (and reasonably large), the chances of 
> getting a duplicate "k" approaches zero... if "k" is not reasonably large or 
> there's a bias that can produce duplicate "k"s with the same value, you're 
> hosed.
> 
> http://www.the-fifth-hope.org/hoop/5hope_speakers.khtml#panel037
> http://en.wikipedia.org/wiki/Digital_Signature_Algorithm
> http://en.wikipedia.org/wiki/ElGamal_signature_scheme

It's worth mentioning that a variant of this is what caused the Elgamal signing 
key problem back in 2003 (and indirectly, what caused Elgamal signatures to be 
dropped from the OpenPGP standard altogether).  See 
http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000160.html for the 
details.

In that attack, all you usually needed was the public key alone, since most 
Elgamal signing keys were primary keys, and primary keys issue signatures over 
the user ID, giving you the signature needed to mount the attack.

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-26 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 24 February 2011 at 2:13:13 PM, in
, Robert J. Hansen wrote:


> It is also theoretically possible to rebuild your
> private key using a fifth of gin and a Ouija board.

I couldn't resist asking: do you have a citation for this?


- --
Best regards

MFPAmailto:expires2...@ymail.com

Always forgive your enemies; nothing annoys them so much
-BEGIN PGP SIGNATURE-

iQE7BAEBCgClBQJNaROjnhSAAEAAVXNpZ25pbmdfa2V5X0lEIHNpZ25pbmdf
a2V5X0ZpbmdlcnByaW50IEAgIE1hc3Rlcl9rZXlfRmluZ2VycHJpbnQgQThBOTBC
OEVBRDBDNkU2OSBCQTIzOUI0NjgxRjFFRjk1MThFNkJENDY0NDdFQ0EwMyBAIEJB
MjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0N0VDQTAzAAoJEKipC46tDG5pAGoEAJXk
8ho+2GxJatM2jAfn8bXQmbUCNCrPvewukFucFWec/Ma4vPJsH6EEO6KdLQCJtTCl
xhDT3wVKE5ckn6cTFYhFERe3u78mLFT0SuXVb39ausP0f2cpnLF0hYAaKqq6zvNn
wzd48/wKCtdBalvj+BsG7HwqJDPIf0G2HDOXakVG
=lOSk
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-24 Thread Aaron Toponce
On Fri, Feb 25, 2011 at 03:39:10AM +1300, Atom Smasher wrote:
> if an attacker has two messages signed with DSA, and they happen to
> use the same value of "k" then it's trivial to recover the private
> key.
> 
> a random "k" is the achilles heel of DSA and elgamal (and their ECC
> derivatives). if "k" is truly random (and reasonably large), the
> chances of getting a duplicate "k" approaches zero... if "k" is not
> reasonably large or there's a bias that can produce duplicate "k"s
> with the same value, you're hosed.

Found this:

http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/

I've learned something new today. Thank you very, very much!

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-24 Thread Jerry
On Thu, 24 Feb 2011 10:38:41 -0500
Daniel Kahn Gillmor  articulated:

> Fortunately, i don't think that the PRNG used in GnuPG has any known
> vulnerabilities.

The key word there is "known"; although the feasibility of rebuilding a
private key by a normal end user is extremely slight. In any case, I am
not going to be losing any sleep over it. Besides, if I wanted a truly
secure encryption, I would use a one-time pad system. That is about as
secure as it gets.

-- 
Jerry ✌
gnupg.u...@seibercom.net
_
Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.

Ignorance is never out of style.  It was in fashion yesterday, it is the
rage today, and it will set the pace tomorrow.


Franklin K. Dane


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-24 Thread Atom Smasher

On Thu, 24 Feb 2011, Aaron Toponce wrote:

However, I was in a discussion with a friend, and the topic came up that 
it is theoretically possible to rebuild your private key if someone had 
access to all your signed mail. We debated the size of signatures and 
mail that would need to be collected for this to be probable.


Is it?

=

if an attacker has two messages signed with DSA, and they happen to use 
the same value of "k" then it's trivial to recover the private key.


a random "k" is the achilles heel of DSA and elgamal (and their ECC 
derivatives). if "k" is truly random (and reasonably large), the chances 
of getting a duplicate "k" approaches zero... if "k" is not reasonably 
large or there's a bias that can produce duplicate "k"s with the same 
value, you're hosed.


http://www.the-fifth-hope.org/hoop/5hope_speakers.khtml#panel037
http://en.wikipedia.org/wiki/Digital_Signature_Algorithm
http://en.wikipedia.org/wiki/ElGamal_signature_scheme


--
...atom

 
 http://atom.smasher.org/
 762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
 -

"To consider yourself an environmentalist
 and still eat meat is like saying you're
 a philanthropist who doesn't give to charity"
-- Howard Lyman


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-24 Thread Daniel Kahn Gillmor
On 02/24/2011 09:09 AM, Aaron Toponce wrote:
> What is the likelihood that an attacker could rebuild a private key from
> a collections of signed mail, and would it depend on the hash used in
> the algorithm?

It doesn't depend as much on the digest algorithm used as it does on the
type of public key and the quality of the PRNG used during the signature
process.  DSA keys in particular can be recovered if the random number
generator used to create the signatures turns out to be predictable:

 http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.1538

Fortunately, i don't think that the PRNG used in GnuPG has any known
vulnerabilities.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Rebuilding the private key from signatures

2011-02-24 Thread Robert J. Hansen
On 2/24/11 9:09 AM, Aaron Toponce wrote:
> However, I was in a discussion with a friend, and the topic came
> up that it is theoretically possible to rebuild your private key if
> someone had access to all your signed mail.

It is theoretically possible to rebuild your private key if someone has
access to *one* signed mail.

It is also theoretically possible to rebuild your private key using a
fifth of gin and a Ouija board.

These two theoretical possibilities are of roughly the same magnitude.
Don't worry about it.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Rebuilding the private key from signatures

2011-02-24 Thread Aaron Toponce
I generated my key back in 2004, and I've been a very vocal and active
supporter of GnuPG, encrypting communications, and digitally signing
mail. However, I was in a discussion with a friend, and the topic came
up that it is theoretically possible to rebuild your private key if
someone had access to all your signed mail. We debated the size of
signatures and mail that would need to be collected for this to be
probable.

Is it?

What is the likelihood that an attacker could rebuild a private key from
a collections of signed mail, and would it depend on the hash used in
the algorithm?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users