Hi Robin,

On Wed, Apr 06, 2022 at 05:31:09PM +0000, Robin H. Johnson wrote:
> On Wed, Apr 06, 2022 at 07:06:30PM +0200, Jason A. Donenfeld wrote:
> > No, you're still missing the point.
> > 
> > If SHA-512 breaks, the security of the system fails, regardless of
> > what change we make. This is because GnuPG uses SHA-512 for its
> > signatures.
> Question directly for you Jason, because you make a professional study
> of this: does the type of breakage/successful attack against against
> SHA-512 matter?
> 
> e.g. is it possible that some type of attack would only work against the
> Manifest entry, but NOT against the GPG signature's embedded SHA-512 (or
> the opposite).
> 
> The best hypothetical idea I had was that there exists some large
> special input that lets an attacker reset the output to an arbitrary
> hash after their malicious payload: but it wouldn't fit in the GPG
> signature space.
 
Generally speaking, the more control an attacker has over the input, the
easier certain types of attacks might be. So maybe in the most general
sense that applies. I wouldn't model a security analysis around that,
though. Rather, the usual way to apply that sort of thinking is to
design algorithms that rely on certain properties of hash functions, but
not others; for example, Ed25519 does not rely on the hash function
being collision resistant due to its construction.

Jason

Reply via email to