>
> A complicating factor is that PGP signature packets include a 64-bit
> key ID which is a hash of the public key.  However, that just requires
> the attacker to randomize the attack and try around 2^64 calculations
> until he finds a matching key ID, which might be feasible for a
> state-level attacker.
>
>
We've noted that a new feature of GPG 2.1.15 is that signatures
are computed over full 20-byte SHA1 key fingerprints [1], in addition to
64-bit key IDs.

[1]
http://gnupg-devel.gnupg.narkive.com/Z0EFUBU7/issuer-fingerprint-was-vanity-keys
_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to