[PATCH] Allow the user to specify AES256 as well as AES128.

Abel Luck abel at guardianproject.info
Wed Jun 5 14:42:16 CEST 2013


Kyle Butt:
> On Wed, May 22, 2013 at 2:19 AM, Werner Koch <wk at gnupg.org> wrote:
> 
>> On Wed, 22 May 2013 03:08, gniibe at fsij.org said:
>>
>>> Although it is a story in future for me, I could imagine that some
>>> people using RSA 4096-bit key now (w/ enough entropy for their pass
>>> phrases) would like that, to match its content.
>>
>> The weakest link we have in the key protection is the passphrase -
>> virtually nobody is able to remember a passphrase with 128 bit entropy
>> and 256 bit is well out of scope.  Now I hear a counterargument of a
>> random passphrase which is pasted into the Pinentry.  That bears the
>> question where to store that one and whether this additional software,
>> USB gimmicks etc. don't introduce a much higher risk of passphrase
>> compromise.  The passphrase tries to mitigate the worst case of a
>> compromised box - now if that is the risk, what are the probabilities
>> that such a compromise is limited to a one-time disk or memory copy
>> attack and not a long lasting active keyboard (or whatever) sniffing
>> attack?  Does anyone really consider that this probability is less than
>> breaking 128 bit AES?
>>
> 
> While passphrases are the weakest link in general, This isn't true of
> every gnupg user, just most. That's why I left the default as AES-128.
> Most gnupg users will never see the option or consider changing it.
> 128 bits of entropy isn't that far out of scope, that's 20 printable ascii
> characters, and a dedicated user could memorize that.
> 
> I never tried to argue about storing a random passphrase and pasting
> it. I don't believe it's relevant to the discussion here.
> 
> 
>>
>>> Well, I have a suggestion that it will be better to use SHA-2 of
>>> relevant size, instead of SHA-1.  It will be more coherent, then.
>>
>> To satisfy todays crypto policy requirements, it would be better to move
>> to a MAC based encryption scheme instead of the ad-hoc OpenPGP encrypted
>> SHA-1 integrity checking.
>>
> 
> I would be willing to do this work.
> 
>>
>> For small devices a different KDF (e.g. scrypt) might be useful, though.
>>
> 
> Or this.
> 

This is what I would like to see. It is desperately needed on Android
and other mobile devices where users use even weaker than normal
passphrases.

> 
>>
>>
>> I'm not sure if it should be a user option or not.  It makes more
>>> sense for me, when GnuPG selects appropriate key store scheme
>>> automatically.
>>
>> Yep.  Algorithm proliferation does not gain us anything.  In fact it
>> makes the system more weak.  If we want to extend the current key
>> protection, a single alternative algorithm with a well defined use case
>> is what we should do.
>>
>>
> I'm not sure I understand the argument here. Are you saying that you
> agree, and that rather than have it be a flag, it should be dependent
> on key size and selected automatically? I'd be happy to send that patch
> instead.
> 
> Kyle.
> 
> 
> 
> _______________________________________________
> Gnupg-devel mailing list
> Gnupg-devel at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-devel
> 




More information about the Gnupg-devel mailing list