pgpfan:agevspgp
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:agevspgp [2021/07/13 16:30] – [Encrypted Backups] Clearer and to the point b.walzer | pgpfan:agevspgp [2024/08/06 20:53] (current) – [File Substitution] From a HN comment. b.walzer | ||
---|---|---|---|
Line 44: | Line 44: | ||
To be clear, " | To be clear, " | ||
- | Here is what this would look like in practice using the example of a single flipped bit near the start of the encrypted file. First age: | + | Here is what this would look like in practice using the example of a single flipped bit((Please note that the single flipped bit here is not a realistic example and that in practice damage tends to encompass one or more media blocks. Such blocks tend to be multiples of 512 bytes. Often the blocks are entirely missing.)) |
$ age -d -i key.txt -o totc_out.txt totc.txt.age | $ age -d -i key.txt -o totc_out.txt totc.txt.age | ||
Line 83: | Line 83: | ||
At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | ||
- | ====Signed Backups==== | + | Another more specific example could be the storage of passwords as is done with [[https:// |
- | Doing backups in this way means that you have to keep the public key secret((There | + | I admit that the previous two examples are contrived. But they are much less contrived than the example of the encrypted tar file. A lesson from application programming |
+ | |||
+ | ====File Substitution==== | ||
+ | |||
+ | Public key encryption has a generic consideration | ||
+ | |||
+ | The traditional fix for this weakness is to cryptographically sign the file ... and, once again, age does not do signatures. An age user would need to go through | ||
+ | |||
+ | The creator of age has suggested that you can just keep the recipient identity (public key) away from the attacker and prevent them from creating a valid ciphertext | ||
+ | |||
+ | >I am confident | ||
+ | |||
+ | ... but provided no explicit argument to that effect. ... and then continued: | ||
+ | |||
+ | >...but it's important not to advertise it as an age-wide property. | ||
+ | |||
+ | In practice the recipient identity key will show up on the command line and/or will be kept in an unencrypted file. So age itself treats it as a potentially public value. | ||
+ | |||
+ | If you and the recipient have the ability to share and keep a secret value secret, why use asymmetrical encryption in the first place? Symmetrical encryption | ||
=====Conclusion===== | =====Conclusion===== |
pgpfan/agevspgp.1626193806.txt.gz · Last modified: 2021/07/13 16:30 by b.walzer