Collision attack against long Key Ids
Robert J. Hansen
rjh at sixdemonbag.org
Sat Mar 14 19:33:06 CET 2026
> If its an OK, albeit simplistic question to ask - is there a reason
> for this?
There are many reasons.
My personal bête noire is there are a lot of people who derive their
social status from the unholy union of (a) being a geek and (b) making
people afraid. When you can make people afraid you can lead them into
looking to you to tell them what to do. Making people afraid is usually
a power play of some kind and it reminds me of high school. What pushes
me over the edge into being a genuinely unpleasant person is when (c)
they make people afraid about something the person is unable to find out
for themselves. When Chicken Little told everyone the sky was falling,
at least Chicken Little had the common decency to lie about something
people could disprove just by looking up.
There are a lot of (a) nerdy people (b) making people scared about (c)
near-future events they have to take on faith.
I don't see much difference between Sam Altman telling people "in
eighteen months half of your jobs will be gone!" and somebody hiding
behind a pseudonym saying "ackshually the new NSA listening center in
Utah is going to be able to crack PGP because...". Either way it's the
same spiel. These people make me very angry.
=====
Then there are the people who deal in half-truth criticisms. For
instance, a lot of people say that Open/LibrePGP don't offer forward
secrecy, and "all modern designs offer perfect forward secrecy."
Rubbish. PGP offered perfect forward secrecy in 1991. It was one of the
first systems with perfect forward secrecy. It's so old it predates the
term perfect forward secrecy.
What perfect forward secrecy means is "the compromise of a key does not
allow an attacker to read messages sent after the compromise." Well,
Open/LibrePGP uses random per-session cryptographic keys. Compromising
the key used for a specific message doesn't help you compromise any
other message, in the past or in the future. Open/LibrePGP is, in that
sense, providing perfect forward secrecy.
At the same time, it's also plainly obvious that Open/LibrePGP uses
long-term keys as well (your asymmetric keypair). And there, sure, there
are criticisms that can be made from a PFS standpoint. Those are valid
and worth listening to.
But for every person who gives a nuanced and complete understanding of
PFS in Libre/OpenPGP, there are a dozen who are just repeating "no
perfect forward secrecy guarantees!" without ever talking about the
subject in a realistic way.
=====
Then there are academics who make highly academic criticisms, that
although are offered in good faith often show a lack of consideration of
real-world constraints on what we can do, or a lack of understanding of
what the real problems are.
For instance, from RFC2440 to the final draft of RFC4880, OpenPGP
specified 3DES as a permissible algorithm. 3DES was designed in the
1970s and is by modern standards unbearably ugly. It has all the
aesthetic qualities of Soviet New Realism art, all the elegance of a
North Korean workers' housing bloc. When the movie _Tropic Thunder_
played in theaters, when Robert Downey Jr.'s character exclaimed
"Behold, God's mistake!", every cryptographer in the audience perked up
thinking 3DES was about to make its Hollywood appearance.
But you'll notice I never said 3DES was weak. After fifty years (!!) of
cryptanalytical research nobody knows of any practical attacks on 3DES
when used in the standard OpenPGP use case. It's kind of impressive that
way. (If you're using it for more than a few hundred megs of data in a
single message you're doing it wrong, but how many of us actually do that?)
Given all this, for many years we were slow to remove 3DES from the
Open/LibrePGP cipher suites. It was on the TODO. It wasn't terribly high
priority. And our attitude on this caused a lot of academics to say
"they still require every client support 3DES; my God, what backwards
heathens."
=====
Some very serious people have made very serious criticisms of OpenPGP
over the years. Matthew Green at Johns Hopkins, for starters, was really
not a fan. See, for instance, this essay:
https://blog.cryptographyengineering.com/2014/08/13/whats-matter-with-pgp/
His criticisms in 2014 were pretty sharp and for the most part fair.
Libre/OpenPGP took notice and have since taken steps to mitigate a lot
of those concerns. (He's probably still not a fan, however.)
But for every solid, well-thought-out, and occasionally devastating
critique on Open/LibrePGP there are easily a dozen ones that vary from
disingenuous to confused to genuinely dishonest and manipulative.
Anyway. Hope this helps. :)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4583 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20260314/c780bea8/attachment.bin>
More information about the Gnupg-users
mailing list