how vulnerable is "hidden-encrypt-to"
vedaal at nym.hush.com
vedaal at nym.hush.com
Mon Aug 20 15:58:00 CEST 2012
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger
<cloudpg at informationelle-selbstbestimmung-im-internet.de> wrote:
> if a message M is encrypted to you and other
>recipients using RSA, then you are of course able to obtain the
>session key K. Now, if you suspect Alice to be a recipient then
>you download her public key from a key server and encrypt the
session
>key K under her public key. If the result matches one of the
>encrypted session keys contained in M, then Alice is a recipient
>of M.
=====
The one sending the message really is in control here ;-)
The sender can use hidden encrypt to ANY public key.
i.e. if Alice is sending the message and wants to hide her
identity,
nothing prevents her from using throw-keyid with Bob's public key
instead of her own, or NIST's, or PGP Corporation's, or any onyone
else's.
If the message is unsigned, the receiver cannot tell,
(assuming it's sent from an appropriately anonymized e-mail
address),
and if it is signed, then the throw -keyid doesn't hide the
sender's identity from the receiver.
vedaal
(sorry about thread-breaking ;-((
sent from a site that doesn't allow e-mail clients)
More information about the Gnupg-users
mailing list