Private key storage hashed vs mac

Kyle Butt kylebutt at gmail.com
Thu Feb 21 17:22:21 CET 2013


On Feb 21, 2013 2:22 AM, "Werner Koch" <wk at gnupg.org> wrote:
>
> On Thu, 21 Feb 2013 08:55, kylebutt at gmail.com said:
> > I'm curious about the private key storage. Currently the integrity of
> > the key is protected by a sha1 of the plaintext. Were there
> > discussions around using encrypt then authenticate with a mac?
>
> The reason this scheme is used is because it is identical to the modern
> OpenPGP way protecting keys.
>

Can you point me at the reference for this?

> We had this discussion a decade ago and it pops up on cryptography@ from

Can you point me at the archives for that discussion?

> time to time.  However, if you want to evaluate this, please also
> consider that a (protected) private key is not intended to be send over
> any public channel [1] but merely acts as a fail stop mitigation in case
> an attacker got physical access to the machine.  If it is possible for
> attacker to gain access to the protected key he should also be able to
> install malware to retrieve an unprotected copy of the key.
>

There are scenarios where an attacker can read or modify your keys without
being able to put malware on a machine.

I wanted to find the discussion, but nothing turned up on Google.

Thanks,
Kyle.
>
> Salam-Shalom,
>
>    Werner
>
>
> [1] Modulo Robert's offer to run an NYT ad with his private key.
>
> --
> Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20130221/18d88965/attachment.htm>


More information about the Gnupg-devel mailing list