phasing out SHA1 for digest creation
Jacob Bachmeyer
jcb62281 at gmail.com
Sun Dec 8 05:48:14 CET 2024
On 12/7/24 07:50, Werner Koch wrote:
> Hi!
>
> On Fri, 6 Dec 2024 19:42, Jacob Bachmeyer said:
>
>> Does GPG already do this? If not, can this message count as a feature
>> request for secure nonces in signatures? Even 64 bits should be
> The suggestion with hashing a nonce is to mitigate a specific way to
> create collisions. OTOH, an arbitrary random nonce allows to change the
> data in an undetectable way - maybe even to create such a collision.
Which I thought I was mentioning in the parenthetical about nonces as
long as the digest used. The first counterargument is motive: why
would a signer want to create a collision?
Presumably, signing {nonce, hash(document, nonce, etc)} instead of only
{hash(document, nonce, etc)} would prevent a third party from altering
the nonce in order to create a collision. Of course, changing the
actual signed blob cannot be done compatibly.
> Even worse, a random nonce adds a covert channel to a signed message.
Oh bother... solving one problem creates *another* problem. I guess I
was not considering /that/ risk, on the reasoning that your cipher
software should be trusted.(I consider nonfree cipher software
categorically insecure.)
> This needs to be avoided in sensitive areas where encryption is not
> allowed for exactly that reason. In particular that new IETF OpenPGP
> specification introduced a mandatory random salt, despite the counter
> arguments that if this will be added the salt must not be random but be
> derive from other information. Some people obviously want to have this
> covert channel in signatures.
Is it plausible that they had the same line of reasoning that I did, and
simply did not consider covert channel risks?
> A nonce, actually salt, can be introduced in a compatible way with
> signature subpackets and maybe extra rules to place that salt as the
> first subpacket. Of course the salt needs to be computed from other
> info.
>
> Anyway, there are no signs that SHA-256 can be attacked in a similar
> way as SHA-1. The SHA3 development process clearly showed that
> SHA256, SHA384, SHA512 are safe choices.
Nor were there signs that SHA-1 could be attacked until it was.
(Although the attacks on SHA-1 are still very limited.)
-- Jacob
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnupg-devel/attachments/20241207/6c8d8cc6/attachment.html>
More information about the Gnupg-devel
mailing list