Re: Digital signatures

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Les wrote:
> My question here is how safe is the process, and how do you
> implement it personally to ensure it is safe?

That question requires the answers to other questions.  Firstly, who
is the attacker you wish to be safe from?  The steps you would need to
take to be "safe" from an entity like the government of a G7 nation is
different than for nosy ISP's, script kiddies, family members, etc.

You also need to determine the value of the information you wish to
protect.

> Moreover, can you estimate the risk being taken with the
> information.

So, for mailing list posts to a public list, I'm quite at ease.
Mostly I sign my messages out of habit and for easy verification
should a list ever mung up my messages or another person tried to
pretend to be me (leaving aside the obvious question of why anyone
would ever want my identity :).

> Is it safe for a year, a day or a century, given the resources
> available today?  Is the process by which the keys are distributed
> and used available to anyone, and can they be falsified, and would
> falsification reduce the security of the process?

With an open, decentralized system like PGP, you can control all of
this.  You can choose to trust whomever you wish.  You can look over
the code that is used to generate keys if you want.

As far as falsification, someone can generate a key that has my user
id (name and email address in my case).  But they cannot create a key
that matches the keyid and fingerprint of my key.  Part of the process
of using public key crypto involves verification of that key info
before assigning trust and validity to a someone elses key.

> Where are the instructions available for implementing the process.For
> example, David, your messages give me the warning Valid signature,
> cannot verify sender.

This would be because you've not verified his key.  In PGP, you have
validity and trust.  Validity is applied to a key, trust is applied to
a person.  If you wanted to trust David's signatures in important
situations, you would need to verify (validate) his key.

Let's assume that you know David already, to the extent that you don't
need to check his ID to know he really is the David that you want to
converse with.  You could verify his key by meeting him and exchanging
key information with him (user id, size, type, key id, and
fingerprint).

You then tell PGP that you've verified this info by certifying
(signing) his key.  His key is now valid as far as PGP is concerned.

Trust is something which you can assign.  For instance, you could
choose to trust David fully (I'd advise against this :).  This means
that if he were to sign my key and then I sent you my key, PGP would
see it as valid -- because it was certified by someone you trust
fully.

You could also choose to trust someone only marginally.  It would
take several signatures from marginally trusted people to make a key
that you haven't signed valid.  This is known as the web of trust and
it's how you can end up verifying keys from people you've not met
directly.

Of course, you get to choose who you trust and how much you trust
them.

> In the case of double encryption, as in the case of "shared secrecy"
> for PGP, how secure is the result?

I'm not sure I follow you here.  What exactly do you mean by double
encryption and "shared secrecy" ?

In PGP, messages are encrypted using a symetric cipher like AES.  The
key that's used for this encryption (the session key) is generated
randomly.  This key is then encrypted with an asymetric cipher like
RSA.  This is done for each of the recipients.  When the you receive
the message, you unlock the session key with your private key, and
then the message itself it decrypted.

> Also if parallel attacks several tens of thousands wide are
> attempted, how secure it the information and for how long?

If you have attackers with that sort of resources, you don't want to
trust the advice of anyone on a public mailing list.  You'd want a
high grade security consultant. :)

You also want to think about whether the resources it would take to
crack a PGP encrypted message would be worth the cost, or if there
were better ways to break your secret.  In most cases, it's far easier
to use a rubber hose attack to beat the information out of you.
Another tactic the government is using these days is to install a key
logger on the victim's computer (using one of those nifty secret
warrants). [1]

> If a new view of decryption comes along, what will become of the
> algorithm and how will we know when it is broken?

The PGP system uses more than one cipher and allows you to choose
which you prefer.  Should one of them begin to look vulnerable, you
can switch to another.  MD5 was used as the hash algorithm in the
early versions of PGP, but it is very much deprecated now because it
is not nearly as secure as it needs to be.  SHA1 is following a
similar path.

As an example, here are the algo preferences on my current key:

Cipher: AES256, AES192, AES, CAST5, 3DES
Digest: SHA512, SHA256, RIPEMD160, SHA1
Compression: ZLIB, BZIP2, ZIP, Uncompressed

(The 3DES and SHA1 are implicit preferences, used by default in PGP if
no other common algorithms can be used.)

> What if I used something like n-dimensional ffts against a noise
> added attack, would the key and data break apart like virus attacked
> dna?

If you can do that, then you could be a famous geek. :)

> But to keep it simple here, is there somewhere a guide that gives step
> by step what do do to ensure the following:
> 	1. you can use pgp signatures in both sending and receiving email.
> 	2.  Instructions for implementing, posting and using your own
> signatures.
> 	3.  the means of generating shared secret posts.
> 	4.  what to do if you discover that your signature and encryption is
> broken.
> 	5.  some estimate of the safety of the algorithms used.

I'd probably start with some of the documentation available at:

http://www.gnupg.org/(en)/documentation/

Some of it is getting old now, but I am sure it is still quite useful.

[1] http://news.com.com/8301-10784_3-9741357-7.html

-- 
Todd        OpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In the province of the mind, what one believes to be true either is
true or becomes true.
    -- John Lilly

Attachment: pgp1ih2X144CG.pgp
Description: PGP signature

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux