On Jan 18, 2010, at 1:35 PM, Daniel Kahn Gillmor wrote:

> so basically, what i'm saying is that the speedup is that you get to
> throw away (2^16-1) of every 2^16 possible passphrases, but you still
> need to do a signficant amount of work to figure out if you can throw
> them away.

Exactly.  The big speedup you get by using the quick check is that you don't 
discover that the key you have is wrong after you've gone and decrypted 
gigabytes of garbage.  It does not improve your s2k performance at all, since 
as you point out, that would render the s2k count sort of meaningless.

Incidentally, a few years ago there was an interesting attack against OpenPGP 
that used the quick check bytes as an oracle.  See 
http://eprint.iacr.org/2005/033 for the paper.  This is why the quick check 
isn't done for public key encryption (only conventional passphrase encryption).

David


_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to