Key Signing

David Turner dct25@cam.ac.uk
Mon Apr 30 19:43:01 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On Mon, 30 Apr 2001, Werner Koch wrote:


> > For example, if we were to organise a password at the meeting, then he
> > goes home and sends me an encrypted email containing the password and his
>
> I am not sure whether I got it right. If your problem is on how to
> sign someones key if he does not know his fingerprint when you meet
> him (or he has no key yet), you can use this protocol:
>
> 1. Create a shared secret. For example by using
> gpg --gen-random 2 10 | gpg --enarmor
> 2. Both parties write it down and keep it secret.
> 3. Alice gives her fingerprint to Bob (she always carries it with her)
> 4. At home, Bob send the fingerprint along with the shared secret in
> an _encrypted_ mail to Alice. He can do so because he knows Alice
> keys
> 5. Alice decrypt the mail from Bob, verifies the secret against her
> copy and can now be sure that it is Bob's fingerprint
> 6. Alice signs Bobs key.
>
The situation was less hypothetical than I had made out. We met at a jazz club, where there is a distinct lack of linux boxes (something I'm trying to change by using one as a spectrum analyser, but that's another story...) I had my fingerprint on my palmtop, and can remember enough of it to know that it hasn't been tampered with, so gave it to him. Since he managed to tell me what his first round was, what software he gave me, what CDs I had with me, how far through Linux From Scratch I was *and* what his fingerprint was, all correctly, in an encrypted message, I deduced that the message has not been tampered with. Similar protocol, but the random secret was generated in a slightly non-standard way. It's good to get confirmation from the experts, though :-) - -- Dave Turner dct25@cam.ac.uk -----BEGIN PGP SIGNATURE----- iD8DBQE67aPUeFNVJYkmfV8RAoANAKCLAOe6MwKmvgrJtFXlJI3Xq8wUZwCfWGjW mMlXyKeHGUm5YajHPLsWthA= =0iyb -----END PGP SIGNATURE-----