From: Richard Barnes [mailto:rlb@xxxxxx] On Sun, Sep 21, 2014 at 10:10 PM, Jim Schaad <ietf@xxxxxxxxxxxxxxxxx> wrote: From: jose [mailto:jose-bounces@xxxxxxxx] On Behalf Of Richard Barnes I think I may have erred by trying to write a treatise on which algorithms are vulnerable :) Here's some updated text, trying to be more concise. Jim: Your points about SHA-256 vs. SHA-512/256 and SHA-256 vs. SHA-3 don't really apply, since JOSE hasn't defined algorithm identifiers for SHA-512/256 or SHA-3. [JLS] Richard – are you planning to update this text when (not if) they are defined? If not then this is still part of the problem even if currently not constrained. The same could also be said to be not a problem for all of the ECDSA algorithms since there is only one hash defined of any given length. (I will ignore the really fun problem for DSA and ECDSA where there is a modulus operation that occurs on the hash value thus creating collisions within the same hash function and making matching of hash function lengths and key lengths of primary importance.) However, as these will almost certainly be defined in the future, they merit inclusion in the potential problems. I believe that this should be included in the discussion as it is much easier to do than to break the mask function of RSA. (Breaking the same hash function twice is very non-trival, having two hash functions that produce the same length hash is much easier.) Is the phrase "Obviously, if other algorithms are added, then they may introduce new risks" insufficient? [JLS] Given the context of the sentence I would say no. It would seem to apply only to RSA-SSA-PSS and not to any of the DSA/ECDSA algorithms. --Richard
|