Problems with private keyring?
Taral
taral@taral.net
Thu Mar 22 21:55:19 2001
--0OAP2g/MAC+5xKAE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Thu, Mar 22, 2001 at 08:44:56PM +0100, Florian Weimer wrote:
> Unfortunately, the situation with DSA signatures is much, much worse.
> IMHO, the protected data is probably not sufficient to validate the
> unprotected data, so the way the secret key is stored has to be
> changed completely. This is going to introduce incompatibilities, and
> I don't think I'm in a position to do this, so no further patches from
> me, sorry. :-/
Well, the attack they propose relies on the fact that the p' they chose
is deliberately very weak (p'-1 has a factorization consisting solely of
powers of small primes) and that p' < q. I still cannot see, however, a
way to replace (g, p, q, y) with another set which passes the proposed
checks.
The easiest fix for this seems to be to include a signature of (p, q,
g, y, x).
--=20
Taral <taral@taral.net>
Please use PGP/GPG to send me mail.
"Never ascribe to malice what can as easily be put down to stupidity."
--0OAP2g/MAC+5xKAE
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjq6ZmwACgkQ7rh4CE+nYEnKRACfTSAEppI4WHUpXgUPJ5C3yMag
ZZ4An0xagpVGEDp+1bdRX+R8Bdi1FgZB
=LHar
-----END PGP SIGNATURE-----
--0OAP2g/MAC+5xKAE--