On 03/06/2013 03:56 PM, otr-us...@lists.cypherpunks.ca wrote:
[...] But since OTR leaks the MAC's, their evidence is something anyone observing the enctypted stream could have engineered (after the fact) [...] We want everyone to be able to encrypt a message (in the past) so that handing over _any_ encrypted message gives you evidence whether you, your conversation partner or John Doe wrote it. That's the plausable deniability aspect of it.

Hi again!

Sorry for the late reply.

I see what forgeability is doing on a technical level. But, and I may lack imagination or something, I still don't see the real benefits of the property.

For some reason, you want the ciphertext transcript to be as forgeable as plaintext transcripts. I don't know if this has something to do with Alice's ability to dispute having ever authored a certain message; if it does, I don't see how. You seem to want anyone, given a ciphertext transcript, to be able to come forward with a set of decryption keys (an arbitrary plaintext transcript) and a set of MAC keys. Why? How does this help Alice? What's the difference no one, one person, or the whole world can produce this? It doesn't prove anything, anyway. Some real world examples of when this is useful would be greatly appreciated.

If the network log (or the ciphertext transcript) in question is not trusted, it may have been tampered with, and can thus be claimed to have been forged whether the expired MAC keys are published or not. So let's assume that the network log is trusted. For the sake of clarity and argument, we can pretend that the network log is provided by an ISP to a court.

The only way for Eve to present any kind of "meaningful" case would be to include the shared secrets (in which case Eve can derive all decryption and MAC keys from this). If Eve has this information, she has all the proof that she needs, and exposing MAC keys wont help Alice. And if Eve doesn't have the shared secrets, but has the MAC keys, she necessarily possesses the means of forging the messages anyway, so her data doesn't prove anything. I see that, without forgeability, any such case that Eve could make would come from either breaking Bob's system, or through Bob's (willing or unwilling) cooperation. Why is this undesired?

Thanks!

Jon
_______________________________________________
OTR-dev mailing list
OTR-dev@lists.cypherpunks.ca
http://lists.cypherpunks.ca/mailman/listinfo/otr-dev

Reply via email to