[4345] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Strengthening the Passphrase Model

daemon@ATHENA.MIT.EDU (David Jablon)
Thu Mar 18 13:07:01 1999

Date: Thu, 18 Mar 1999 12:30:12 -0500
To: iang@cs.berkeley.edu (Ian Goldberg)
From: David Jablon <dpj@world.std.com>
Cc: cryptography@c2.net
In-Reply-To: <7cpjdt$hlc$1@abraham.cs.berkeley.edu>

At 01:03 AM 3/18/99 GMT, Ian Goldberg wrote:
> In article <v03130300b2e74ce2cecc@[24.128.119.92]>,
> Arnold G. Reinhold <reinhold@world.std.com> wrote:
>>>> 2. PGP should burn computer time hashing the passphrase. While you cannot
>>>> increase the entropy of a passphrase with an algorithm, ...

But, you can increase the entropy of a passphrase-derived
session key with a key amplifier.  In a better situation,
this might help.

>> At 7:47 AM +0000 2/10/99, Antonomasia wrote:
>>>> From memory, Rivest and Wagner have a paper on crypto time locks [...]
Arnold:
>> ... I don't see how it applies here.  Finding a passphrase by
>> exhaustive search is an inherently parallel problem.
Ian:
> Indeed; the more appropriate paper to read is "Secure Applications of
> Low-Entropy Keys." John Kelsey, Bruce Schneier, and David Wagner. 1997
> Information Security Workshop. ...

Stretching partially deters attack on stored data.
What you really want is to move your sensitive
password-derived data to a safer place.

And if you can't find that one perfect spot,
how about splitting the password-encrypted key,
keeping part on some hopefully-secure and available server,
and part locally?  Then no one compromise permits
exhaustive search.

-- dpj



home help back first fref pref prev next nref lref last post