Re: Questions about generating keys (hash firewalls)

2007-09-10 Thread Sven Radde
Oskar L. schrieb: > No, in my example I used two, not one messages (pictures) and created > permutations of both, and then compared both groups of hashes against each > other. This appears to be somewhere in the middle between a birthday attack and a preimage attack. It looks like a preimage attac

Re: Questions about generating keys (hash firewalls)

2007-08-27 Thread Doug Barton
On Sun, 26 Aug 2007, Robert J. Hansen wrote: > Doug Barton wrote: >> It almost sounds from what you're saying above that there actually is an >> argument for RSA's hash firewall being "better" than DSA[2] here, but if I >> correctly understood what you said later in the thread, the margin by >> wh

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Robert J. Hansen
Doug Barton wrote: > It almost sounds from what you're saying above that there actually is an > argument for RSA's hash firewall being "better" than DSA[2] here, but if I > correctly understood what you said later in the thread, the margin by > which it's "better" is so small as to not be worth

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Doug Barton
On Sat, 25 Aug 2007, Doug Barton wrote: > The other question I had is about what you said above regarding truncating > hashes with DSA2. Am I understanding correctly that even with DSA2 the hash > size can be no larger than 160 bits? *sigh* Never mind this bit, I just re-re-read a later part of

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Doug Barton
On Fri, 24 Aug 2007, David Shaw wrote: > On Fri, Aug 24, 2007 at 09:06:24PM +0300, Oskar L. wrote: > >> Do hash firewalls have any drawbacks (performance decrease, difficult to >> implement, patent issues etc.)? What's the reason DSA doesn't have one? > > I suspect a major reason is the main use o

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Oskar L.
Allen Schultz wrote: > Is there a comprehensive list of hashes used in encryption that can > help me choose which is the best to use? I'm sure there is, but such a list would not do you much good. The application you use probably only supports a few. Some are old and insecure, and should not be us

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Robert J. Hansen
Allen Schultz wrote: > Is there a comprehensive list of hashes used in encryption that can > help me choose which is the best to use? If all you want is to provide a very high level of authentication for your messages, just stick with the defaults and you'll do just fine. Seriously. GnuPG is spe

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Allen Schultz
Is there a comprehensive list of hashes used in encryption that can help me choose which is the best to use? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
> Well, except that your attack isn't a birthday attack. > > A birthday attack involves making a ton of different messages and > checking _all_ messages created to find _any_ collision. > > Your attack involves taking one particular message and creating > permutations of it, one after another, look

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Robert J. Hansen
Oskar L. wrote: > I only meant to point out that a birthday attack would have a much better > chance of finding a collision than a second preimage attack. I'm sorry if > I made it sound trivial, I know it's not. I just tried to give an example > of how it works that would be easy to understand. We

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
Robert J. Hansen wrote: > Doing a birthday attack is highly nontrivial. E.g., to do a birthday > attack on SHA256 requires a minimum, a _minimum_, of over 10**17 joules > to be liberated as heat. That's about as much as you'd get from an > entire full-out strategic nuclear exchange between the US

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Robert J. Hansen
Oskar L. wrote: > calculators designed to show very large numbers can show the result. Now I > compare all the hashes from one picture to all the hashes from the other. Doing a birthday attack is highly nontrivial. E.g., to do a birthday attack on SHA256 requires a minimum, a _minimum_, of over 1

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Robert J. Hansen
Robert J. Hansen wrote: > In a room of 23 people, there are C(23, 2) different pairs, or 253. D'oh. This will teach me to read things quickly. Oskar was specifically saying pairs of which Bob was a part, not total pairs in the room. (gets out the brown paper bag) _

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Robert J. Hansen
Oskar L. wrote: > So if we start with Bob, we need to have 253 more people, to be able to > make 253 different pairs of which Bob is part of. We need 22 more people. In a room of 23 people, there are C(23, 2) different pairs, or 253. You should probably refresh your knowledge of combinatorics be

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread David Shaw
On Fri, Aug 24, 2007 at 09:06:24PM +0300, Oskar L. wrote: > Do hash firewalls have any drawbacks (performance decrease, difficult to > implement, patent issues etc.)? What's the reason DSA doesn't have one? I suspect a major reason is the main use of DSA is really DSS - and DSS was never intended

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Werner Koch
On Fri, 24 Aug 2007 20:06, [EMAIL PROTECTED] said: > Do hash firewalls have any drawbacks (performance decrease, difficult to > implement, patent issues etc.)? What's the reason DSA doesn't have one? DSA ist the signature algorithm used with DSS, the Digital Signature Standard. DSS requires the

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
That was a very good explanation of what a hash firewall and a second-preimage attack are. But I think it gives the impression that all the hash firewall is good for is protecting against a second-preimage attack, and therefore is of little importance, since a successful second-preimage attack on S