validating other keys on your public keyring

Bob Mathews bobmath@earthlink.net
Thu Oct 24 21:58:02 2002


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wednesday 23 October 2002 22:52, Tuyen DINH wrote:
>  * is it equivalent or less secure to personally check the person's
>    keyid ?

Checking the 32-bit key ID is 100% insecure. I have a program that can fo=
rge=20
any desired 32-bit key ID on a DSA key, in only a couple of days running =
on=20
an old 350 MHz Pentium-II. It took me just a few hours to write, includin=
g=20
the time it took to learn to use the OpenSSL library. The same technique=20
should work with El Gamal keys. Forging a 64-bit key ID would be far more=
=20
difficult, but might be possible for someone willing to spend millions of=
=20
dollars in the attempt (that seems unlikely to me, though). Forging the f=
ull=20
160-bit fingerprint is pretty much impossible.

With old version 3 keys, the key ID is simply the lower bits of the RSA p=
ublic=20
modulus, so it's trivially easy to forge a key with someone else's 64-bit=
 key=20
ID on it.

 -bob mathews

-----BEGIN PGP SIGNATURE-----

iD8DBQE9uFFtPgDecCrBEpcRAqMFAKCpbhqHyOaJq5UlSFgiRUyEwnAmPwCfTbf9
O/f/nIasNQr+pxbQBSwHmSQ=3D
=3DiYi9
-----END PGP SIGNATURE-----