[10514] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Cringely Gives KnowNow Some Unbelievable Free Press... (fwd)

daemon@ATHENA.MIT.EDU (Paul Crowley)
Wed Feb 27 12:47:35 2002

To: "Enzo Michelangeli" <em@em.no-ip.com>
Cc: "Cryptography List" <cryptography@wasabisystems.com>
From: Paul Crowley <paul@ciphergoth.org>
Date: 26 Feb 2002 19:32:56 +0000
In-Reply-To: "Enzo Michelangeli"'s message of "Tue, 29 Jan 2002 09:26:09 +0800"
Message-ID: <87664k2g47.fsf@saltationism.subnet.hedonism.cluefactory.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

"Enzo Michelangeli" <em@who.net> writes:
> Well, a nice characteristic that RSA doesn't have is the ability of using as
> secret key a hash of the passphrase, which avoids the need of a secret
> keyring

All PK algorithms have this property; seed a CSPRNG with the
passphrase and use the CSPRNG as the source of randomness in key
generation. 

> and the relative vulnerability to dictionary attacks.

The protection against dictionary attacks seems to be that checking
whether a given passphrase is the correct one is slow, because you
have to check it against the public key.  However, the minimum time to
check passphrase validity can be made arbitrarily slow whatever PK
algorithm is used, with techniques such as key stretching.

http://www.counterpane.com/low-entropy.html

Your proposal makes a system *more* vulnerable to dictionary attacks,
since the attack can be mounted without the need to seize the secret
keyring.
-- 
  __  Paul Crowley
\/ o\ sig@paul.ciphergoth.org
/\__/ http://www.ciphergoth.org/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post