On 2012-03-30, Asheesh Laroia <ashe...@asheesh.org> wrote: > As the author of that asheesh.org note, I suggest you read it carefully. > (-:
After reading that note four times, I still see no details about your attack tool. > In particular, pay attention to how key timestamps are used in OpenPGP! > It's interesting and was surprising to me at first, too. Your note does not contain the word “timestamp”. According to RFC 4880, the key generation timestamp is near the beginning of the key blob. Thus, every time you change the timestamp, you need to re-hash a relatively long fixed string (the public modulus in an RSA key, or the group parameters in a DLP-based key). Changing the timestamp may be useful for DSA or ElGamal keys (I'm not convinced of that), but it's not helpful in generating an RSA key with chosen key ID. Robert Ransom _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk