Re: Signatures and encryption headers
- From: Oleg Khovayko <"[my_last_name]"@gmail.com>
- Date: Wed, 05 Nov 2008 03:05:01 GMT
In this situation,
while header need only for decryption,
and payload had been signed before encryption --
you don't need to sign header values, I think.
If someone replaces any field, message will be decrypted
incorrectly, and payload signature check will fail.
There only resend attack possible - with injection whole
old valid messages (prev. saved).
But, if recipient care about resend/reroute attack blocking
on the level after decryption, you do not worry about this.
On Nov 4, 3:20 pm, Oleg Khovayko <"[my_last_name]"@gmail.com> wrote:.As minimum, you need add into signed area some timestamp
and sequence number, for resist to "resend attack".
In this attack, Mallory sends to recipient old _valid_ message,
from huge collection, accumulated during long time of listening.
There is no notion of time in the encryption header. If any notion of
time is required it would be included in the payload, encrypted and
signed. The encryption header only includes the information required
to decrypt the payload. Anything else would be part of the payload
(and be encrypted if the payload is).
Let say I have a payload of data I want to encrypt and sign.
The system support various formats for encryption, such as different
cipher, chaining mode, usage of session key etc...
So I create an encryption header that basically include:
- The payload size
- Which cipher and chaining mode are used.
- An encrypted session key
- An IV
- A key index that indicate the recipient which key to uses to decrypt
- Some parameters used to derive the real key used
So the clear payload is signed, then its encrypted.
The encryption header, payload and signatures are sent to the
Now the question is: should this header be signed too ? Or is it
I say its unnecessary as long as the recipient validate properly the
parameters. Whatever an attacker might change in the encryption
header, will change the decrypted payload and will cause the signature
check to fail.
Other people might say that the recipient should not do any
computation with any data that has not been signed. That it might be
possible to exploit the header to cause a fault in the recipient that
might cause him to do something bad...
Whats your take on this ? Should the encryption header be signed or
- Prev by Date: Re: Constructing PRNGs from hash functions
- Next by Date: Re: amateurish AONT question
- Previous by thread: Re: Signatures and encryption headers
- Next by thread: Re: Signatures and encryption headers