[148895] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Dual_EC_DRBG backdoor: a proof of concept

daemon@ATHENA.MIT.EDU (ianG)
Fri Jan 3 11:04:18 2014

X-Original-To: cryptography@metzdowd.com
Date: Fri, 03 Jan 2014 11:25:30 +0300
From: ianG <iang@iang.org>
To: =?ISO-8859-1?Q?Kriszti=E1n_Pint=E9r?= <pinterkr@gmail.com>, 
	John Kelsey <crypto.jmk@gmail.com>
In-Reply-To: <435004895.20140103084545@gmail.com>
Cc: Cryptography Mailing List <cryptography@metzdowd.com>,
	Jon Callas <jon@callas.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 3/01/14 10:45 AM, Kriszti=E1n Pint=E9r wrote:
>
> John Kelsey (at Friday, January 3, 2014, 2:31:00 AM):
>> If we replaced dual ec drbg's output function by taking the parity
>> of the output point's scalar value, it looks to me like we'd have a
>> secure drbg despite the potentially evil choice of P and Q, with
>> whatever good theoretical properties came from dual ec drbg.
>
> dual ec is easy to fix, but what is the point? it is even easier not
> to use it, and use fortuna instead, which is better in every way
> possible. people only use dual ec if they have to, to be compliant
> with whatever standards. but then they can't change it, not even the
> extraction part (heck, they can't even fix the mistakes in the
> documentation, see the case of openssl).
>


This is a seriously good point.  Defaults are meant to be changed, and =

are offered as a sort of security feature.  Alternatives are offered as =

if this makes sense in a security context [1].

But can defaults be changed?  The barrier to this is often high, and too =

high to be realistic or give any security benefit.

Two questions, possibly as research topics:

      1. How often are security defaults changed?  In any given =

environment such as OpenSSL, etc.

      2.  How hard is it to change the defaults?  What is the mental =

energy, skill & time required?  How high is this barrier?

The result of defaults seems to be that they are poorly chosen [2], end =

up being the only choice for 99%, and open up an easy attack, DUAL_EC [3].


iang



[1] http://financialcryptography.com/mt/archives/001461.html
[2] http://financialcryptography.com/mt/archives/001450.html
[3] http://financialcryptography.com/mt/archives/001446.html
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post