Ivan Krsti? wrote:
On Sep 19, 2007, at 5:01 PM, Nash Foster wrote:
Any actual cryptographers care to comment on this? I don't feel
qualified to judge.

If the affected software is doing DH with a malicious/compromised peer, the peer can make it arrive at a predictable secret -- which would be known to some passive listener. But hey, if the peer is malicious or compromised to begin with, it could just as well do DH normally and explicitly send the secret to the listener when it's done. Not much to see here.


I agree that this is minutia, but there is a difference. If the peer can arrange the key to be some predictable secret, it can do so without revealing itself. Eve is happy. If however it has to leak the key some other way, it needs some covert channel. This channel is the sort of thing that security reviews might more easily stumble over. E.g., IDS guy asking why these strange packets emanate from the crypto server...

Which is to say, it's worth closing off this particular form of attack if it can be done without undue cost. When I did a key exchange last in a protocol design, I attempted to address it by inserting some hashing steps.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to