A coming attack on PGP, and a way to mitigate it
Daniel Franke
df at dfranke.us
Mon May 4 05:13:35 CEST 2009
David Shaw <dshaw at jabberwocky.com> writes:
> I rather like this idea. I was thinking that a good way to tie it
> into the GPG way of doing things would be another one of the %-
> expandos. So you could do something like set a notation for
> "random at example.com
> =%10r" for 10 digits of random hex, %15r for 15 digits, etc.
>
> Before we go down this road, however, it might be worth waiting the
> (should be short) period of time before the new SHA-1 paper is
> formally published and people can give it a good read over. The
> slides are good, but I think it's healthy to get a better notion of
> the attack before we implement a countermeasure (even one as harmless
> to compatibility as this).
I wrote a followup last night retracting this idea, as it isn't quite
going to work. For some reason though, it never got redelivered back
to me even though it's in the ML archive:
http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html
Did you receive it but overlook it before writing this response, or
did it get dropped?
Leaving this message unsigned in case the signature has something
to do with screwing up delivery.
--
Daniel Franke df at dfranke.us http://www.dfranke.us
|----| =|\ \\\\
|| * | -|-\--------- Man is free at the instant he wants to be.
-----| =| \ /// --Voltaire
More information about the Gnupg-devel
mailing list