Re: Complexities on faking one signature

2017-04-03 Thread Wouter Verhelst
On Sun, Apr 02, 2017 at 07:12:38PM -0400, Robert J. Hansen wrote: > > 2. Enumerating the possible signature of that certain message and > > using the target's public key to verify if one of the signatures is > > correct. > > I'm not sure what you mean here; that's not how signatures work. > Signat

Re: Complexities on faking one signature

2017-04-03 Thread Robert J. Hansen
> I believe the OP is asking whether it'd be easier to brute-force a > signature than it is to brute-force a private key. Unimaginably harder to brute-force a sig. Since RSA is deterministic (at least, naïve RSA is), a sig is done on a digest (of let's say size 256 bits) and there are 2**256 diff

Complexities on faking one signature

2017-04-02 Thread iry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello everyone! When an adversary attempts to create someone's GPG signature of a certain message, there are at least two ways to do so: 1. Computing the private key from the public key of the target and then using the private key to sign the messag

Re: Complexities on faking one signature

2017-04-02 Thread Robert J. Hansen
> 1. Computing the private key from the public key of the target and > then using the private key to sign the message; The difficulty of this is dependent on the length of the asymmetric key. NIST's guidance is that cracking a 1024-bit key is about 2**80 work, a 2048-bit key is about 2**112 work,

Complexities on faking one signature

2017-04-02 Thread iry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello everyone! When an adversary attempts to create someone's GPG signature of a certain message, there are at least two ways to do so: 1. Computing the private key from the public key of the target and then using the private key to sign the messag