[12331] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Key Pair Agreement?

daemon@ATHENA.MIT.EDU (Greg Rose)
Tue Jan 21 18:16:05 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Wed, 22 Jan 2003 07:47:34 +1100
To: <radia.perlman@sun.com>
From: Greg Rose <ggr@qualcomm.com>
Cc: "David Wagner" <daw@mozart.cs.berkeley.edu>,
	<cryptography@wasabisystems.com>
In-Reply-To: <200301210208.h0L28Mj02804@sydney.East.Sun.COM>

At 09:08 PM 1/20/2003 -0500, Radia Perlman - Boston Center for Networking 
wrote:
>I was going to suggest something similar to what
>David Wagner suggested, but with Scott telling Alice
>the modulus size and the *high* order 64 bits (with the
>top bit constrained to be 1). I can see how Alice
>can easily generate two primes whose product will have
>that *high* order part, but it seems hard to
>generate an RSA modulus with a specific *low* order
>64 bits.

This is the essence of the "DEADBEEF" attack on PGP. PGP used the least 
significant bits of the modulus as the key ID. If you want to create a key 
with a particular key ID, you just hack the code so that it checks for 
primes that end in things which will multiply together to yeild the desired 
answer; the easy case, of course, is 0x00000001 and 0xDEADBEEF, which is 
what was done to create the Prime Rib Lovers' key as a proof of concept[*]. 
There does not appear to be any significant erosion of security, although 
I'm not sure if anyone's thought too seriously about that specific case either.

regards,
Greg.

[*] I note that there are three keys on the us.pgp.net server with 
0xDEADBEEF as their key ID (including the one mentioned above), and one of 
them is even a DSA key! I can only assume this was brute forced through the 
hash function.

Greg Rose                                       INTERNET: ggr@qualcomm.com
Qualcomm Australia          VOICE:  +61-2-9817 4188   FAX: +61-2-9817 5199
Level 3, 230 Victoria Road,                http://people.qualcomm.com/ggr/
Gladesville NSW 2111    232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post