GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
(I'll try to start a new thread from the following quotes.)


On Sat, Nov 28, 2009 at 8:50 AM, Robert J. Hansen  wrote:
> Matt wrote:
>> If I had a sufficiently good passphrase, would Google returning my
>> secret key as the first hit result for every search for a day still be
>> secure?
>
> "Secure" is not a very good word to use.  It means so many different
> things to so many different people.  "Secure" really means "in
> accordance with my security policies" -- the use of the word is
> inherently subjective.


Related to the same problem (strength of the secret key data
encryption measures), I've posted some months ago an email on the
scy.crypt Usenet group, but I didn't got a satisfactory (that is
factual) answer. (See below.)

Maybe someone could clear this out (at least from GnuPG part). (My
original post was related with both GnuPG an OpenSSH).

~~ Original post:

(I have a very basic question that to most of the persons reading
this news-group might seem trivial. But anyway...)

My concern (as stated in the subject) is related to the security
strength of GnuPG and OpenSSH secret / private keys in the following
context:
* the secret / private keys are encrypted by using a password that
only me (the owner) knows;
* an attacker is in possession of my secret / private key files;
* the attacker wants to gain access to the secret / private key
(thus being able to impersonate me);
* the attacker chooses as attack method to brute-force the files
off-line, by trying to guess my password;
* (by guessing the password I mean trying all possible passwords
that fit a given pattern; the password is not a dictionary word, but
instead is (truly) randomly created (i.e. DiceWare);)

The question is: what does GnuPG or OpenSSH do to slow down
password brute-force? I mean does the password derivation function use
some iterations? If so how many? Can I configure them? I guess so but
I couldn't find any data on the net on a quick search. (Any references
are appreciated.)

Also, how many bits of security should my password have in order
to withstand an attack from a small / medium enterprise? (Government
is out of the question as they could get access to my infrastructure
by force...)

Thank you for your patience and your wisdom,
Ciprian Craciun.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw

On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote:


   Maybe someone could clear this out (at least from GnuPG part). (My
original post was related with both GnuPG an OpenSSH).

~~ Original post:

   (I have a very basic question that to most of the persons reading
this news-group might seem trivial. But anyway...)

   My concern (as stated in the subject) is related to the security
strength of GnuPG and OpenSSH secret / private keys in the following
context:
   * the secret / private keys are encrypted by using a password that
only me (the owner) knows;
   * an attacker is in possession of my secret / private key files;
   * the attacker wants to gain access to the secret / private key
(thus being able to impersonate me);
   * the attacker chooses as attack method to brute-force the files
off-line, by trying to guess my password;
   * (by guessing the password I mean trying all possible passwords
that fit a given pattern; the password is not a dictionary word, but
instead is (truly) randomly created (i.e. DiceWare);)

   The question is: what does GnuPG or OpenSSH do to slow down
password brute-force? I mean does the password derivation function use
some iterations? If so how many? Can I configure them? I guess so but
I couldn't find any data on the net on a quick search. (Any references
are appreciated.)


GnuPG (really OpenPGP) does iterated password hashing.  See section  
3.7.13 "Iterated and Salted S2K" of RFC-4880 for the fine details, but  
the gist is as you surmised - the passphrase is run through many hash  
iterations.  This slows down passphrase guessers as they must also  
repeat the hashing part the same number of times.  By default, GnuPG  
uses 65536 iterations of the pasphrase hash, but can be configured via  
the --s2k-count option to be as high as 65011712 iterations.


Be careful though - in some cases, a too-large value can hurt you  
here.  If you create a passphrase-encrypted message on a fast machine,  
and pick a huge s2k-count, and then try to decrypt on a slow machine  
(say, a cell phone), the message may become effectively unusable since  
the repeated hashes can take an unusable amount of time on the slow  
processor.


I'd have to look up the details if anyone is interested, but there was  
a case a few months back of a huge s2k-count actually causing an  
embedded device to trigger its deadman timer - someone had generated  
the message on a fast machine (so never noticed the large iteration  
count), but sent it to the slow one which clobbered it.



   Also, how many bits of security should my password have in order
to withstand an attack from a small / medium enterprise? (Government
is out of the question as they could get access to my infrastructure
by force...)


Difficult question to answer, since everyone is going to wave around  
their opinion. :)


I'd suggest starting with the various calculators on http://www.keylength.com/

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

David Shaw escribió:
> On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote:
...
>>Also, how many bits of security should my password have in order
>> to withstand an attack from a small / medium enterprise? (Government
>> is out of the question as they could get access to my infrastructure
>> by force...)
> 
> Difficult question to answer, since everyone is going to wave around
> their opinion. :)
> 
> I'd suggest starting with the various calculators on
> http://www.keylength.com/

  Now the interesting question would be, how to calculate the real bit
length of a passphrasse? I googled, and found this message, from this list:
http://lists.gnupg.org/pipermail/gnupg-users/2008-October/034842.html

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJLEVCJAAoJEMV4f6PvczxAYLIH/2kwGMDiBa7UNs83MyyzdeFs
0DnKyEpoK4HSsvvVZhpEqBUOLuxep6qtn2uhnFlXCw7tC3e+iGTfyudPK9dhLi0J
9aIkvYMSjzTCiiywiRAMHha6Z0dei5ffIsVupjeUnuzwiEXCDliUR5MODiQc4fP6
uGJcU0Z/e/IkFlFfFKAACySvLHJcoNzllBMEnfXudqfJpeOsUoGq/T6P2zZfjGrZ
ly0gwKVfEowB7fi5QXYwYL6Dfi+FmctNRbzxL0ED2Pq1q1N+fzg4VnxGX6dqtLgX
EtBsg2z3jvLZE6nSD65kxkSmxu9fWSS8UIlWu21YzgFtSYWQTl1w/5gJaNTwt7o=
=CL86
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
On Sat, Nov 28, 2009 at 5:47 PM, David Shaw  wrote:
> On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote:
>
>>   Maybe someone could clear this out (at least from GnuPG part). (My
>> original post was related with both GnuPG an OpenSSH).
>>
>> ~~ Original post:
>>
>>   (I have a very basic question that to most of the persons reading
>> this news-group might seem trivial. But anyway...)
>>
>>   My concern (as stated in the subject) is related to the security
>> strength of GnuPG and OpenSSH secret / private keys in the following
>> context:
>>   * the secret / private keys are encrypted by using a password that
>> only me (the owner) knows;
>>   * an attacker is in possession of my secret / private key files;
>>   * the attacker wants to gain access to the secret / private key
>> (thus being able to impersonate me);
>>   * the attacker chooses as attack method to brute-force the files
>> off-line, by trying to guess my password;
>>   * (by guessing the password I mean trying all possible passwords
>> that fit a given pattern; the password is not a dictionary word, but
>> instead is (truly) randomly created (i.e. DiceWare);)
>>
>>   The question is: what does GnuPG or OpenSSH do to slow down
>> password brute-force? I mean does the password derivation function use
>> some iterations? If so how many? Can I configure them? I guess so but
>> I couldn't find any data on the net on a quick search. (Any references
>> are appreciated.)
>
> GnuPG (really OpenPGP) does iterated password hashing.  See section 3.7.13
> "Iterated and Salted S2K" of RFC-4880 for the fine details, but the gist is
> as you surmised - the passphrase is run through many hash iterations.  This
> slows down passphrase guessers as they must also repeat the hashing part the
> same number of times.  By default, GnuPG uses 65536 iterations of the
> pasphrase hash, but can be configured via the --s2k-count option to be as
> high as 65011712 iterations.
>
> Be careful though - in some cases, a too-large value can hurt you here.  If
> you create a passphrase-encrypted message on a fast machine, and pick a huge
> s2k-count, and then try to decrypt on a slow machine (say, a cell phone),
> the message may become effectively unusable since the repeated hashes can
> take an unusable amount of time on the slow processor.
>
> I'd have to look up the details if anyone is interested, but there was a
> case a few months back of a huge s2k-count actually causing an embedded
> device to trigger its deadman timer - someone had generated the message on a
> fast machine (so never noticed the large iteration count), but sent it to
> the slow one which clobbered it.
>
>>   Also, how many bits of security should my password have in order
>> to withstand an attack from a small / medium enterprise? (Government
>> is out of the question as they could get access to my infrastructure
>> by force...)
>
> Difficult question to answer, since everyone is going to wave around their
> opinion. :)
>
> I'd suggest starting with the various calculators on
> http://www.keylength.com/
>
> David


Thank you for the quick reply. (This is the kind of answer I was
hopping to get. :) ) It seems that `s2k-count` escaped me. :)

Maybe there should be an entry in the FAQ about this topic.

Related with my question about the password bit strength there
still is a vale on my eyes. So I guess (sorry for not being properly
documented here):
* the private / public key pair is generated by using whatever
means (RSA / DSA);
* my password is taken and fed into "Iterated and Salted S2K" to
obtain the secret key encryption.
* the private key data is taken and fed into '' algorithm that
uses as password what has been obtained at the previous step.

So my question about key strength is: what symmetric key algorithm
is used to safeguard the key. (Again I'm not properly documented
here.) And based on the identity of this algorithm, I can use the site
cited (http://www.keylength.com/) to determine a "best practices" key
length. (Other wise I'll have to go with the generic term "symmetric
key encryption"... :) )


>  Now the interesting question would be, how to calculate the real bit
> length of a passphrasse? I googled, and found this message, from this list:
> http://lists.gnupg.org/pipermail/gnupg-users/2008-October/034842.html

By key strength I mean the bits of entropy given by the password
generation pattern. For example a 4-digit PIN number has only 13.3
bits of entropy, even though we need at least 16 bits to store it.
(This was also pointed out by Farami in his reply.)

Thanks again,
Ciprian.


P.S.: I'm also aware of the fact that iterations do not help at
all, if a big-budget agency (NSA and the like), is going to build a
hardware based brute-force key breaking, as they can build a pipeline
of iteration functions that would try one key in O(1) time. :) (Or I'm
wrong here?)

___
Gnupg-users

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

November 28th for gnupg-users@gnupg.org thread "GnuPG private key
resilience against off-line brute-force attacks"

Entropy is a relative thing AFAIR:

For one who knows than a password was generated by using diceware the
entropy will be 7776^n + 7776^n-1 ... 7776^1 where n is the number of
words.

For one who knows the lenght of password the entropy will be 256^n
where n is the length. If it is know than it is english text entropy
would be (26+26+10)^n.

In contrast for one who do not know how password has been generated
the entropy will be as if it were a random one.

In short the apparent entropy of passowrds depends of how many the
atacker know of it.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEAREIAAYFAksRVbsACgkQZ4DA0TLic4iwsgCfSpBGgu2zIYTL98CTde7QgTBu
u9sAn3fgOtJhGoj4QTXgm6A1IjE+n4HU
=t1Dq
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Backup of private key

2009-11-28 Thread Chris Hills
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

There is thread in the archives with the subject "TPK Archival" that may
be useful.

http://lists.gnupg.org/pipermail/gnupg-users/2009-March/035996.html

Regards,

Chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=8Q46
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Robert J. Hansen
David Shaw wrote:
> Difficult question to answer, since everyone is going to wave around
> their opinion. :)

There are some empirical facts which may be useful, though -- like
observing the RC5-64 project was able to break a 64-bit key via a
massive distributed project that took 18 months of runtime.

That's not a recommendation, just a data point which may be useful to
people in making their own estimations.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread John Clizbe
Robert J. Hansen wrote:
> David Shaw wrote:
>> Difficult question to answer, since everyone is going to wave around
>> their opinion. :)
> 
> There are some empirical facts which may be useful, though -- like
> observing the RC5-64 project was able to break a 64-bit key via a
> massive distributed project that took 18 months of runtime.
> 

And estimates for RC5-72 including Moore's Law effects were hovering at 18 
years.

-- 
John P. Clizbe  Inet:John (a) Mozilla-Enigmail.org
You can't spell fiasco without SCO. hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=help

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Nicholas Cole
On Sat, Nov 28, 2009 at 3:47 PM, David Shaw  wrote:

[snip]

> I'd suggest starting with the various calculators on
> http://www.keylength.com/

A very interesting website.  I followed the links, and found this document:

http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml

It seems that the NSA is moving away from RSA/DH etc. cryptography,
and now "only" approves their use for secret level material.  They are
instead pushing elliptic curve cryptography.  I hadn't realised that
there was such pressure to move away from traditional key exchange.
Is this about the fear of quantum computing, or something else?

EC in gpg is still some way off, it seems.

N

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread M.B.Jr.
Hi,


On Sat, Nov 28, 2009 at 1:47 PM, David Shaw  wrote:
>>   The question is: what does GnuPG or OpenSSH do to slow down
>> password brute-force? I mean does the password derivation function use
>> some iterations? If so how many? Can I configure them? I guess so but
>> I couldn't find any data on the net on a quick search. (Any references
>> are appreciated.)
>
> GnuPG (really OpenPGP) does iterated password hashing.  See section 3.7.13
> "Iterated and Salted S2K" of RFC-4880 for the fine details, but the gist is
> as you surmised - the passphrase is run through many hash iterations.  This
> slows down passphrase guessers as they must also repeat the hashing part the
> same number of times.  By default, GnuPG uses 65536 iterations of the
> pasphrase hash, but can be configured via the --s2k-count option to be as
> high as 65011712 iterations.


Considering a password/passphrase, which has -- by default, its
65536th hash iteration result, locally stored for comparison.

If I adjust (via --s2k-count) my GnuPG's iterations number, will it
generate and store a new sum value for my actual passphase? Or for
this passphrase specifically, it will continue working with the number
of iterations used by the time the passphrase was created?


Regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw

On Nov 28, 2009, at 12:37 PM, Robert J. Hansen wrote:


David Shaw wrote:

Difficult question to answer, since everyone is going to wave around
their opinion. :)


There are some empirical facts which may be useful, though -- like
observing the RC5-64 project was able to break a 64-bit key via a
massive distributed project that took 18 months of runtime.

That's not a recommendation, just a data point which may be useful to
people in making their own estimations.


That's sort of the problem, though.  There are countless facts that  
can be brought to bear on this question, and each one, by itself is  
just an additional point which does not add very much to the perennial  
question of key length.   The nice thing about the keylength.com site  
is that they (or rather the several research papers and guides that  
comprise the site) gather together hundreds or more of individual  
facts and - carefully showing their methodology so that others can  
learn - do derive recommendations.


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw

On Nov 28, 2009, at 3:07 PM, M.B.Jr. wrote:


Hi,


On Sat, Nov 28, 2009 at 1:47 PM, David Shaw   
wrote:

  The question is: what does GnuPG or OpenSSH do to slow down
password brute-force? I mean does the password derivation function  
use
some iterations? If so how many? Can I configure them? I guess so  
but
I couldn't find any data on the net on a quick search. (Any  
references

are appreciated.)


GnuPG (really OpenPGP) does iterated password hashing.  See section  
3.7.13
"Iterated and Salted S2K" of RFC-4880 for the fine details, but the  
gist is
as you surmised - the passphrase is run through many hash  
iterations.  This
slows down passphrase guessers as they must also repeat the hashing  
part the

same number of times.  By default, GnuPG uses 65536 iterations of the
pasphrase hash, but can be configured via the --s2k-count option to  
be as

high as 65011712 iterations.



Considering a password/passphrase, which has -- by default, its
65536th hash iteration result, locally stored for comparison.

If I adjust (via --s2k-count) my GnuPG's iterations number, will it
generate and store a new sum value for my actual passphase? Or for
this passphrase specifically, it will continue working with the number
of iterations used by the time the passphrase was created?


The s2k-count is only used when creating the passphrase for the first  
time (and that applies to both creating a new secret key as well as  
encrypting something with a passphrase via --symmetric).  If you want  
to change the s2k-count of an existing secret key, you need to set the  
new s2k-count and then change the passphrase.  You can "change" it to  
the same passphrase if you like - it's the creation of a new  
passphrase-to-key that picks up the new s2k-count.


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key
resilience against off-line brute-force attacks"

Loop unrolling only gives more performance in very small loops, for
not so small ones there can be in fact a performance penality since as
the unrolled code is great it leaves less cache for data.

The complexity of a S2K algoritm is constant for variable input and
constant iterations, in other words, it is O(1) but this O(1) assumes
constant number of iterations, if we consider that factor the
complexity would be O(iterations).

So that O(1) than you say is correct but meaningless in this context.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEAREIAAYFAksRpCIACgkQZ4DA0TLic4iEUACgjxnvVcF0JXiBI3MuMv8HHwdY
+P4AniUvv+j5Ysg99Qc+xDZ9e1LnCzxS
=h116
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw

On Nov 28, 2009, at 11:55 AM, Ciprian Dorin, Craciun wrote:


   Thank you for the quick reply. (This is the kind of answer I was
hopping to get. :) ) It seems that `s2k-count` escaped me. :)

   Maybe there should be an entry in the FAQ about this topic.

   Related with my question about the password bit strength there
still is a vale on my eyes. So I guess (sorry for not being properly
documented here):
   * the private / public key pair is generated by using whatever
means (RSA / DSA);
   * my password is taken and fed into "Iterated and Salted S2K" to
obtain the secret key encryption.
   * the private key data is taken and fed into '' algorithm that
uses as password what has been obtained at the previous step.


The "" is CAST5, by default.  You can change it with --s2k-cipher- 
algo.  The usual s2k rules apply - if you change the s2k-cipher-algo,  
it won't take effect until you change the passphrase.  Also, be  
careful you don't shoot yourself in the foot with setting the  
algorithm to something you can't handle.  This is less of a danger  
than with most algorithm changing tweaks: you only have to guarantee  
that *you* (and not all of your correspondents) have the ability to  
handle the key.


So if you want your passphrase to be as strong as CAST5, you'd need a  
really massive passphrase.  The passphrase is almost always the  
weakest part of this sort of system, by far.



   P.S.: I'm also aware of the fact that iterations do not help at
all, if a big-budget agency (NSA and the like), is going to build a
hardware based brute-force key breaking, as they can build a pipeline
of iteration functions that would try one key in O(1) time. :) (Or I'm
wrong here?)


They're more likely to hit you with a wrench, a la http://xkcd.com/ 
538/  :)


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
On Sun, Nov 29, 2009 at 12:29 AM, Mario Castelán Castro
 wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key
> resilience against off-line brute-force attacks"
>
> Loop unrolling only gives more performance in very small loops, for
> not so small ones there can be in fact a performance penality since as
> the unrolled code is great it leaves less cache for data.
>
> The complexity of a S2K algoritm is constant for variable input and
> constant iterations, in other words, it is O(1) but this O(1) assumes
> constant number of iterations, if we consider that factor the
> complexity would be O(iterations).
>
> So that O(1) than you say is correct but meaningless in this context.
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iEYEAREIAAYFAksRpCIACgkQZ4DA0TLic4iEUACgjxnvVcF0JXiBI3MuMv8HHwdY
> +P4AniUvv+j5Ysg99Qc+xDZ9e1LnCzxS
> =h116
> -END PGP SIGNATURE-


Again, as I've replied to Mario (off-the-list, below the excerpt
for the rest of the list), by pipe-lining I assumed something like a
hardware SIMD architecture.

But I do agree that for a software-based implementation the
iteration count does imply O(iteration_count) time complexity (which
is constant). But not for a hardware implementation, where I can trade
O(1) (and by `1` I don't mean constant, I actually mean `one
heart-beat or a small number of hardware cycles`) in time with a O(n)
in hardware complexity.

In short:
>Now imagine that we construct `iteration_count` many hardware
> based `hash` blocks.
>
> password -> (hash) -> ... iteration_count ... -> (hash) -> output

Could someone prove me wrong? (I'm not a hardware expert, but I
believe it's technical possible.)

Ciprian.


On Sat, Nov 28, 2009 at 7:20 PM, Ciprian Dorin, Craciun
 wrote:
> On Sat, Nov 28, 2009 at 7:08 PM, Mario Castelán Castro
>  wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>>
>> November 28th for gnupg-users@gnupg.org thread "GnuPG private key
>> resilience against off-line brute-force attacks"
>>
>>>P.S.: I'm also aware of the fact that iterations do not help at all,
>>>if a big-budget agency (NSA and the like), is going to build a
>>>hardware based brute-force key breaking, as they can build a pipeline
>>>of iteration functions that would try one key in O(1) time. :) (Or
>>>I'm wrong here?)
>>
>> Pipelining do not make iterated functions go to O(1)!. They are faster
>> but still of the same complexity. So: more iterations, more time that
>> it took to calculate, be the CPU where ejecuted pipelined or not.
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG v1.4.9 (GNU/Linux)
>>
>> iEYEAREIAAYFAksRWPcACgkQZ4DA0TLic4hC/QCfe9k3PybJ7X4W0oApBuob1OWh
>> yjAAn2tYiBK3yUZkAQh8dcWwwlrgxUU5
>> =Om9a
>> -END PGP SIGNATURE-
>
>
>By pipeline-ing, I don't mean what we have in CPU's.
>
>I assume that the general working principle of the iterations work
> like this:
> 
>password = ...
>iteration_count = ...
>hashed_password = password
>for i in range (0, iterattion_count):
>hashed_password = hash (hashed_password)
> 
>
>Now this code can be unroll-ed (if the iteration count is known at
> build-time):
> 
>password = ...
>hashed_password = password
>hashed_password = hash (hashed_password)
>... in total iteration_count times
>hashed_password = hash (hashed_password)
> 
>
>Now imagine that we construct `iteration_count` many hardware
> based `hash` blocks.
>
> password -> (hash) -> ... iteration_count ... -> (hash) -> output
>
>And at each time-tick (heartbeat) we fed 'password + 1' and push
> the output from one hash box to another (at the same time). Thus at
> each step we obtain as output one hashed password per heart-beat.
>
>This is why I'm saying it is only O(1), but O(n) in
> hardware-blocks. Thus we trade hardware complexity with time
> complexity.
>
>This architecture is called SIMD (Single Instruction Multiple
> Data) http://en.wikipedia.org/wiki/SIMD
>
>So, does it seem possible now? :) (I've not actually have seen any
> mention of such method, but my opinion is that it's possible.)
>
>Ciprian.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key
resilience against off-line brute-force attacks"

Ciprian: Wath you say is possible but useless.

One could build a machine who computes anything in only 1 clock cycle
or than not even need clock cycles: there are circuits than change it
output as it input is changed without need of a pulse (Usually from a
clock, it is: constant frecuency pulse generator) but the change is
not inmmediate. As the compexity (Circuit complexity, not
computational complexity) increases the delay betwen input change (Or
clock signal) and output change becomes greater and greater thus they
operating frecuence is low.

So, yes, it can be built a machine than compues the S2K in one clock
cycle, but it clock cycle shold be of very very low frecuency thus
having the same performance as a machine than computes a S2K in say,
20,000 cycles but with much faster cicles.

This is the contrary version of the megahert myth: "More cycles, more
speed" than assumes than a 2.4 GHz CPU have the same eficiency per
cycle than a 3.2 one. You instead think than more eficience per cycle
gives more performance, your mistrake is than the cycles will be
larger and frecuency much lower.

Performance = Frecuency * Performance of each cycle. Sometimes one can
make cycles 2 times more efficient but frecuency only 20% lower as
intel do with P4 to Core 2 but this tradeoff can't be repeated infite
times. There are some point where slighty more efficient cycles
provokes a much more loss in frecuency and therefore the overall
performance will be low.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEAREIAAYFAksRwJ4ACgkQZ4DA0TLic4il2QCeKXlMID7S0K8/ay3JuWCqvxrP
Kq8An1GDC/bGlgbwjGr8ebrdRAPgJ+H4
=o+UI
-END PGP SIGNATURE-


2009/11/28 Ciprian Dorin, Craciun :
> On Sun, Nov 29, 2009 at 12:29 AM, Mario Castelán Castro
>  wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>>
>> November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key
>> resilience against off-line brute-force attacks"
>>
>> Loop unrolling only gives more performance in very small loops, for
>> not so small ones there can be in fact a performance penality since as
>> the unrolled code is great it leaves less cache for data.
>>
>> The complexity of a S2K algoritm is constant for variable input and
>> constant iterations, in other words, it is O(1) but this O(1) assumes
>> constant number of iterations, if we consider that factor the
>> complexity would be O(iterations).
>>
>> So that O(1) than you say is correct but meaningless in this context.
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG v1.4.9 (GNU/Linux)
>>
>> iEYEAREIAAYFAksRpCIACgkQZ4DA0TLic4iEUACgjxnvVcF0JXiBI3MuMv8HHwdY
>> +P4AniUvv+j5Ysg99Qc+xDZ9e1LnCzxS
>> =h116
>> -END PGP SIGNATURE-
>
>
>    Again, as I've replied to Mario (off-the-list, below the excerpt
> for the rest of the list), by pipe-lining I assumed something like a
> hardware SIMD architecture.
>
>    But I do agree that for a software-based implementation the
> iteration count does imply O(iteration_count) time complexity (which
> is constant). But not for a hardware implementation, where I can trade
> O(1) (and by `1` I don't mean constant, I actually mean `one
> heart-beat or a small number of hardware cycles`) in time with a O(n)
> in hardware complexity.
>
>    In short:
>>    Now imagine that we construct `iteration_count` many hardware
>> based `hash` blocks.
>>
>> password -> (hash) -> ... iteration_count ... -> (hash) -> output
>
>    Could someone prove me wrong? (I'm not a hardware expert, but I
> believe it's technical possible.)
>
>    Ciprian.
>
>
> On Sat, Nov 28, 2009 at 7:20 PM, Ciprian Dorin, Craciun
>  wrote:
>> On Sat, Nov 28, 2009 at 7:08 PM, Mario Castelán Castro
>>  wrote:
>>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA256
>>>
>>> November 28th for gnupg-users@gnupg.org thread "GnuPG private key
>>> resilience against off-line brute-force attacks"
>>>
P.S.: I'm also aware of the fact that iterations do not help at all,
if a big-budget agency (NSA and the like), is going to build a
hardware based brute-force key breaking, as they can build a pipeline
of iteration functions that would try one key in O(1) time. :) (Or
I'm wrong here?)
>>>
>>> Pipelining do not make iterated functions go to O(1)!. They are faster
>>> but still of the same complexity. So: more iterations, more time that
>>> it took to calculate, be the CPU where ejecuted pipelined or not.
>>> -BEGIN PGP SIGNATURE-
>>> Version: GnuPG v1.4.9 (GNU/Linux)
>>>
>>> iEYEAREIAAYFAksRWPcACgkQZ4DA0TLic4hC/QCfe9k3PybJ7X4W0oApBuob1OWh
>>> yjAAn2tYiBK3yUZkAQh8dcWwwlrgxUU5
>>> =Om9a
>>> -END PGP SIGNATURE-
>>
>>
>>    By pipeline-ing, I don't mean what we have in CPU's.
>>
>>    I assume that the general working principle of the iterations work
>> like this:
>> 
>>    password = ...
>>   

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread markus reichelt
* "Ciprian Dorin, Craciun"  wrote:

> Thank you for the quick reply. (This is the kind of answer I was
> hopping to get. :) ) It seems that `s2k-count` escaped me. :)
> 
> Maybe there should be an entry in the FAQ about this topic.

Well, other projects make good use of that option, f.e. loop-AES,
have a look at section 5 of

http://loop-aes.sourceforge.net/loop-AES.README

-- 
left blank, right bald


pgphmDBHXrpjd.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users