how vulnerable is "hidden-encrypt-to"

vedaal at nym.hush.com vedaal at nym.hush.com
Mon Aug 20 15:58:00 CEST 2012


On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger 
<cloudpg at informationelle-selbstbestimmung-im-internet.de> wrote:

> if a message M is encrypted to you and other
>recipients using RSA, then you are of course able to obtain the
>session key K.  Now, if you suspect Alice to be a recipient then 
>you download her public key from a key server and encrypt the 
session
>key K under her public key.  If the result matches one of the
>encrypted session keys contained in M, then Alice is a recipient 
>of M.

=====

The one sending the message really is in control here ;-)
The sender can use hidden encrypt to ANY public key.

i.e. if Alice is sending the message and wants to hide her 
identity,
nothing prevents her from using throw-keyid with Bob's public key 
instead of her own, or NIST's, or PGP Corporation's, or any onyone 
else's.

If the message is unsigned, the receiver cannot tell,
(assuming it's sent from an appropriately anonymized e-mail 
address),
and if it is signed, then the throw -keyid doesn't hide the 
sender's identity from the receiver.


vedaal

(sorry about thread-breaking ;-((
sent from a site that doesn't allow e-mail clients)




More information about the Gnupg-users mailing list