On Fri, Jun 15, 2018 at 10:56:48AM -0400, David Benjamin wrote:
> On Fri, Jun 15, 2018 at 7:37 AM Nikos Mavrogiannopoulos <n...@redhat.com>
> wrote:
> 
> I think it's a little more complex than that. Keys used in multiple ways
> are affected by interactions between those uses, so formal analysis tends
> to want to exclude these cases. So, yes, ideally we would separate every
> key everywhere. But, as Hubert notes elsewhere in the thread, we wish for
> the TLS 1.3 upgrade to be as smooth as possible, which includes being able
> to reuse any externally-provisioned keys (RSA, symmetric, or whatever).
> These two desires are in tension.
> 
> For stuff like RSA, we don't have easy ways around this. If you have an
> id-rsaEncryption key---which is common---that's what you've got. So the RFC
> 4055 and TLS 1.3, for practicality's sake, allow this.

I once calculated that it is extremely unlikely that there exists _any_
RSA plaintext that is valid signature (for possibly different messages)
as both RSA PKCS#1 v1.5 and RSA-PSS.

This is regardless of if such plaintext would be feasible to find or if
it was feasible to find one or both of the messages it signs.

However, straight out collision might not be realistic model of this. But
on the other hand, with hashes collision resistance of both hashes does not
imply one can not feasbily find cross-collisions or even cross-second-
preimages.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to