Problems with private keyring?
Taral
taral@taral.net
Fri Mar 23 18:15:08 2001
--YiEDa0DAkWCtVeE4
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Fri, Mar 23, 2001 at 01:45:36AM +0100, Florian Weimer wrote:
> Taral <taral@taral.net> writes:
>=20
> > On Fri, Mar 23, 2001 at 12:38:53AM +0100, Florian Weimer wrote:
> > > As an added bonus, it protects against signature computation errors
> > > (due to overclocking or bugs in the MPI implementation), which
> > > was first proposed in this context by Lutz Donnerhacke. GnuPG
> > > calculates the signature in Z/pZ x Z/qZ instead of Z/nZ (which would
> > > be slower). If the computation in one component of the direct sum
> > > fails, the difference to the correct result is likely a multiple of
> > > p or q. (AFAIK, this is called a 'Bellcore attack' in German hacker
> > > circles.)
> >=20
> > Maybe we should do our calculations in Z/nZ by default, providing an
> > '--enable-fast-signatures' option for those who aren't (as) concerned...
>=20
> The verification already takes place in Z/nZ, so we can have the best
> of both worlds.
Yes, but the problem is that if signature generation takes place in Z/pZ
x Z/qZ and an error occurs during the process, it is possible to
accidentally expose the private key material. Doing (m^e mod n) directly
with modular exponentiation is more secure in this respect.
--=20
Taral <taral@taral.net>
Please use PGP/GPG to send me mail.
"Never ascribe to malice what can as easily be put down to stupidity."
--YiEDa0DAkWCtVeE4
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjq7hFUACgkQ7rh4CE+nYEl8dgCfct+uLqQPikSaYJI500kl3hd8
5BoAoI72Bng1+AoLvnYBdccFQQG1BMpJ
=Cibf
-----END PGP SIGNATURE-----
--YiEDa0DAkWCtVeE4--