pgpfan:mdc
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:mdc [2022/07/19 00:40] – Protection b.walzer | pgpfan:mdc [2024/06/29 21:25] (current) – The technical article now exists. b.walzer | ||
---|---|---|---|
Line 1: | Line 1: | ||
======The OpenPGP Modification Detection Code is Actually Good====== | ======The OpenPGP Modification Detection Code is Actually Good====== | ||
+ | |||
+ | //A more detailed (and technical) article covering the same ground as this one exists: [[pgpfan: | ||
I once worked for a company that had a strange and intriguing dilemma. They had a popular Product. Marketing determined that the popularity was due to the fact that the Product lasted significantly longer than competing products. No one in the company had the faintest idea why that was the case. The design did not differ in any obvious way from the design used by the competition. While I was there, an engineering project was initiated with the hope of understanding why the Product was better. I left the company before any definite result. For all I know the mystery still remains. | I once worked for a company that had a strange and intriguing dilemma. They had a popular Product. Marketing determined that the popularity was due to the fact that the Product lasted significantly longer than competing products. No one in the company had the faintest idea why that was the case. The design did not differ in any obvious way from the design used by the competition. While I was there, an engineering project was initiated with the hope of understanding why the Product was better. I left the company before any definite result. For all I know the mystery still remains. | ||
- | The situation with the OpenPGP modification detection code (MDC) very much reminds me of the story of the Product. Legend has it that the MDC was created as a kind of an afterthought. It works very well but it is not obvious why it does. I have never seen an inclusive explanation. Here I will attempt to produce such an explanation. | + | The situation with the OpenPGP modification detection code (MDC) very much reminds me of the story of the Product. Legend has it that the MDC was created as a kind of an afterthought((Since I first wrote this, I have come to believe that this is //just// a legend. The principles that make the MDC work were known at the time of its design. See the [[pgpfan: |
+ | |||
+ | Note that there is a another legend floating around that states that the MDC only has the equivalent of "16 bits of security" | ||
When OpenPGP is used for something like email, the messages are authenticated directly with a signature. So the MDC is not relevant in the most common use case. So the MDC is not that important. It would still simplify things and eliminate much pointless discussion if the MDC could in fact be shown as strong. It would eliminate having to go through the more obscure uses of OpenPGP to determine how applicable the MDC was to each. | When OpenPGP is used for something like email, the messages are authenticated directly with a signature. So the MDC is not relevant in the most common use case. So the MDC is not that important. It would still simplify things and eliminate much pointless discussion if the MDC could in fact be shown as strong. It would eliminate having to go through the more obscure uses of OpenPGP to determine how applicable the MDC was to each. | ||
Line 13: | Line 17: | ||
{{mdc1.svg}} | {{mdc1.svg}} | ||
- | We create this by hashing the message. Then we append the hash to the end of the message. After that we encrypt everything; message and hash. To check for modification we hash the message and compare that hash to the hash appended to the message. | + | We create this by [[wp> |
Let's consider the easiest situation for the attacker and assume they know the entire message. Then the attacker can hash that known message and will then know what the hash was before encryption. As a result they can modify the hash to any value they want by flipping bits as required. So the attacker can change the message to anything they want without restriction and can change the hash so that their changes would not be detected. If their target message is shorter than the original they can just generate the hash early and drop the extra part. So this is not entirely secure. | Let's consider the easiest situation for the attacker and assume they know the entire message. Then the attacker can hash that known message and will then know what the hash was before encryption. As a result they can modify the hash to any value they want by flipping bits as required. So the attacker can change the message to anything they want without restriction and can change the hash so that their changes would not be detected. If their target message is shorter than the original they can just generate the hash early and drop the extra part. So this is not entirely secure. | ||
Line 59: | Line 63: | ||
The MDC is secure and is well suited to the sort of offline encryption that the OpenPGP standard embodies. [[pgpfan: | The MDC is secure and is well suited to the sort of offline encryption that the OpenPGP standard embodies. [[pgpfan: | ||
- | |||
- | =====A Less Intuitive, More Technical Explanation===== | ||
- | |||
- | OCFB-MDC is a case of hash then encrypt. The cipher block mode is the modified version of cipher feedback used by OpenPGP (OCFB). The modification is | ||
- | the addition of a prefix block consisting of random data. The traditional CFB initialization vector (IV) is replaced by the encryption of a block of zeros. | ||
- | This serves to prevent an attacker from being able to get access to either the IV or the plaintext value of the random data prefix block. | ||
- | |||
- | The modification detection code (MDC) is a SHA1 hash of the random data prefix block and the plaintext message. The inclusion of the random data makes the | ||
- | MDC unpredictable and prevents known plaintext based modification. | ||
- | |||
- | OCFB-MDC is immune to the classic attacks against hash then encrypt that involve getting the victim to encrypt an attack message that is later truncated to | ||
- | produce a second valid message. | ||
=====References===== | =====References===== | ||
Line 76: | Line 68: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | * [[https:// | ||
[[pgpfan: | [[pgpfan: | ||
[[em: | [[em: | ||
pgpfan/mdc.1658191255.txt.gz · Last modified: 2022/07/19 00:40 by b.walzer