Re: PlayStation 3 predicts next US president

2007-12-10 Thread James A. Donald

William Allen Simpson wrote:
   The notary would never sign a hash generated by
   somebody else.  Instead, the notary generates its
   own document (from its own tuples), and signs its
   own document, documenting that some other document
   was submitted by some person before some
   particular time.

James A. Donald:
  And how does it identify this other document?

William Allen Simpson wrote:
 Sorry, obviously I incorrectly assumed that we're
 talking to somebody skilled in the art

 Reminding you that several of us have told you that a
 notary has the document in her possession; and binds
 the document to a person; and that we have rather a
 lot of experience in identifying documents (even for
 simple things like email), such as the PGP digital
 timestamping service.

 Assuming,
   Dp := any electronic document submitted by some
   person, converted to its
 canonical form
   Cp := a electronic certificate irrefutably
   identifying the other person
 submitting the document
   Cn := certificate of the notary Tn := timestamp of
   the notary S() := signature of the notary

   S( MD5(Tn || Dp || Cp || Cn) ).

Assuming that the attacker knows or can guess Tn, and
that the canonical form allows images, then the attack
still works.

The attacker can create several documents, D1, D2, D3,
D4, D5, such that MD5(Tn || D1 || Cp || Cn) is equal to
MD5(Tn || D2 || Cp || Cn), which is equal to MD5(Tn ||
D3 || Cp || Cn), etc.

He then gets the notary to sign MD5(Tn || D1 || Cp ||
Cn), and then uses  whichever of D1, D2, D3, D4, and D5
is convenient.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: PlayStation 3 predicts next US president

2007-12-10 Thread William Allen Simpson

Francois Grieu wrote:

That's because if Tn is known (including chosen) to some person,
then (due to the weakness in MD5 we are talking about), she can
generate Dp and Dp' such that
  S( MD5(Tn || Dp || Cp || Cn) ) = S( MD5(Tn || Dp' || Cp || Cn) )
whatever Cp, Cn and S() are.


First of all, the weakness in MD5 (computational feasibility over time)
that we are talking about is not (yet) a preimage or second preimage
attack.  Please don't extrapolate your argument.

Second of all, you need to read my messages more carefully.  No good
canonical format allows random hidden fields or images.

Third of all, that's not a weakness of a notary protocol -- it's a trap!
The whole point of a notary is to bind a document to a person.  That the
person submitted two or more different documents at different times is
readily observable.  After all, the notary has the document(s)!

Remember, the notary is not vouching for the validity of the content of
the document.  A notary only certifies that something was submitted by
some person at some time.  And that cannot be broken by making multiple
submissions, or submissions that themselves have the same hash.

That's one reason I'm much more interested in the attack on X.509.



If Tn was hashed after Dp rather than before, poof goes security.


But since it's not, that's a ridiculous strawman.  I was remembering PGP
off the top of my head.  Fairly certain that Kerberos does, too.  Not
everybody is naive!

And since the timestamp is predictable (within some range, although
picoseconds really aren't very predictable), the protocols that I've
designed include message identifiers, nonces, and sequence numbers, too.

As you may recall, I mentioned that there were other fields

He asked for an explanation about how a document is identified, he got
one.  Don't expect me to redesign an entire notary (or even a timestamp)
protocol on a Sunday evening for a mailing list  Really, there are
fairly secure standards already available.

However, the actual topic of this thread is code distribution.  In that
case, there is no other party certifying the documents.  The code
packager is also the certifier.  There is (as yet) no weakness in the
MD4 family (including MD5 and SHA1) that allows this attack by another
party.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: More on in-memory zeroisation

2007-12-10 Thread Dave Korn
On 09 December 2007 06:16, Peter Gutmann wrote:

 Reading through Secure Programming with Static Analysis, I noticed an
 observation in the text that newer versions of gcc such as 3.4.4 and 4.1.2
 treat the pattern:
 
   memset(?, 0, ?)
 
 differently from any other memset in that it's not optimised out.

 Can anyone who knows more about gcc development provide more insight on
 this? Could it be made an official, supported feature of the compiler?

  I'm sure it could; why not raise it on the GCC mailing list?  It sounds like
all it would involve would be a patch to the documentation and maybe a comment
in the source.

cheers,
  DaveK
-- 
Can't think of a witty .sigline today

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]