Rotating encryption keys

Peter Lebbing peter at digitalbrains.com
Thu Jan 21 13:07:11 CET 2016


On 21/01/16 12:32, Lachlan Gunn wrote:
> The first reason is that you can't do it if the key only exists on a
> smart card.

I'd say that's a bad idea anyway. What if the smartcard breaks?

> The second is that you now have to do one decryption per
> message, so if the key is on a smartcard then it becomes more
> time-consuming to compromise the whole database, but this is kind of
> marginal, I admit.

I don't understand. The log with session keys requires one smartcard
decryption to decrypt the whole log. The old private subkey requires one
smartcard decryption to decrypt the material, and then one "computer"
decryption per item encrypted to it, so it takes more time. Also, we're
talking about compromise, but instead of measuring the amount of time it
takes to crack something, we're talking about the amount of time it
takes to do regular crypto? That seems silly, is the only attacker in
your threat model using a Commodore 64 or other homecomputer from the
80's to access your encrypted material?

> You can safely put the database on Dropbox or something because it
> contains the same information as in the encrypted messages, just with a
> different recipient effectively.

Effectively, the same goes for the encrypted old subkey, AFAICS. Both
hold a session key encrypted to the new subkey, and a symmetrically
encrypted payload that serves to decrypt all your old data. This
symmetric encryption is the same as used on the encrypted messages, so
if it's not trustworthy, you're in trouble anyway.

HTH,

Peter.

PS:

One way to broadly approximate the "there is no other copy of this key"
behaviour of a smartcard is:

Buy two smartcards, use both regularly so you quickly notice one dying.
Put the key on both, and also encrypt a copy of the key to itself, store
the encrypted copy somewhere.

When one smartcard breaks, buy a new one immediately. Take a secure
system, use the other smartcard to decrypt the key and install it on the
new smartcard.

For a secure system, you can install a fresh copy of an operating system
and thoroughly scrub it with itself afterwards. I think it's fun to
watch an OS overwrite itself! Firmware-based exploits remain a problem,
though.

But I'm rapidly going into a wholly different topic.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>



More information about the Gnupg-users mailing list