On Wednesday, December 18, 2013 at 9:25 AM, "Werner Koch" <w...@gnupg.org> 
wrote:

>The paper describes two attacks.  The first attack allows to 
>distinguish
>keys: An attacker is able to notice which key is currently used for
>decryption.  
...

> While listening to the acoustic 
>emanations of
>the targeted machine, the smartphone will send new encrypted 
>messages to
>that machine and re-construct the private key bit by bit.  A 4096 
>bit
>RSA key used on a laptop can be revealed within an hour.
>
>GnuPG 1.4.16 avoids this attack by employing RSA blinding during
>decryption.  

=====

Am not familiar with how RSA 'blinding' works, 
but am surprised that it cannot be used to 'blind' RSA as to the identity of 
the key ;-(

Here is a potential workaround though:

If a sender suspects that the receiver may be in a place where acoustical 
surveillance can detect the key id, 
then the sender and receiver can do the following:

[1] The sender sends a message encrypted to both the sender's and receiver's 
usual keys,
with an instruction in the plaintext, that if a 'special  atypical' key is to 
be used, then the message is to be sent encrypted to that special atypical key, 
using the throw-keyid option, as well as encrypting conventionally to a 
passphrase.

[2] The passphrase to be used for conventional encryption is the session key 
string for the first encrypted message in [1], which the sender and receiver 
now have, and they can decrypt the messages using conventional encryption.

[3] Whenever the correspondents are in an environment 'safe' from this type of 
acoustic threat, the message can be decrypted using the 'special typical' key.  
Whatever information is intended to be conveyed by using a 'special key', will 
still be understood by the receiver.


vedaal


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to