Re: Implementation of Chosen-Ciphertext Attacks against PGP andGnuPG

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 12 Aug 2002 11:45:26 -0600, aleph1  said:

> must be taken into account in order to maintain confidentiality. We also 
> recommend changes in the OpenPGP standard to reduce the effectiveness of our 
> attacks in these settings. 

Countermeasures are defined in the OpenPGP drafts since October 2000.

This MDC (Manipulation Detection Code) feature is supported since PGP
7.0 (decryption only) and GnuPG 1.0.2.  The latest OpenPGP draft (06)
even changed the wording to strongly suggest the use of the MDC
feature.  We have already changed the GnuPG development version to
emit an error and not only a warning when a corrupt MDC hash is
detected, so that frontends can't ignore the warning.

GnuPG uses MDC when either Twofish or AES is used as cipher algorithm
(selected by the preference system) or when the special MDC flag is
listed in the preferences.  The option --force-mdc does what you
expect.

The general problem is that the MDC feature is not compatible with any
PGP versions before 7.0 or GnuPG 1.0.2.  You won't simply not be able
to decrypt a message if you use such a version.  If you are running a
modern version you should make sure that AES has been enabled in the
key preferences.


Salam-Shalom,

   Werner


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux