Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Posted Jun 4, 2016 0:54 UTC (Sat) by DOT (subscriber, #58786)In reply to: Wolf: Stop it with those short PGP key IDs! by jberkus
Parent article: Wolf: Stop it with those short PGP key IDs!
Posted Jun 4, 2016 0:55 UTC (Sat)
by k8to (guest, #15413)
[Link] (3 responses)
I find the idea alluring.
Posted Jun 4, 2016 1:21 UTC (Sat)
by DOT (subscriber, #58786)
[Link] (2 responses)
I think the attacks mentioned in the article are averted especially because no humans can be involved in the conveying of the images. They are easy to scan, but impossible to summarize or copy by hand.
Posted Jun 5, 2016 0:06 UTC (Sun)
by lsl (subscriber, #86508)
[Link]
Not anymore! You can also make them look like pictures of Peter Weinberger (the 'w' in awk).
http://research.swtch.com/qart
(the other articles there are worth reading, too)
Posted Jun 7, 2016 23:29 UTC (Tue)
by gwolf (subscriber, #14632)
[Link]
Daniel's idea is sound and very good, provided every person receiving a nametag is able to check right away that QR's content. I don't know why we have abandoned the idea, but it might be worth pushing again for DebConf this year.
Posted Jun 4, 2016 18:05 UTC (Sat)
by cortana (subscriber, #24596)
[Link] (8 responses)
Maybe in 10 years, curve25519 will be more widely supported and keys will be shorter. :)
Posted Jun 4, 2016 21:58 UTC (Sat)
by dsommers (subscriber, #55274)
[Link] (3 responses)
When also considering the amount of research efforts in the quantum computing area, this might not be as far away that many would prefer.
But QR encode the full fingerprint and a matching e-mail address, and you might very well have a far better QR code which can download a key easily, regardless of the key size.
Posted Jun 5, 2016 18:05 UTC (Sun)
by linuxrocks123 (subscriber, #34648)
[Link] (2 responses)
Posted Jun 6, 2016 19:45 UTC (Mon)
by dsommers (subscriber, #55274)
[Link]
https://www.youtube.com/watch?v=DZ2DcILZAbM
Posted Jun 8, 2016 11:27 UTC (Wed)
by szbalint (guest, #95343)
[Link]
Posted Jun 5, 2016 7:56 UTC (Sun)
by rmayr (subscriber, #16880)
[Link] (2 responses)
(Disclaimer: In my research group, we design crypto protocols and have been proposing various out-of-band channels for nearly a decade now. The above may therefore be biased.)
Posted Jun 5, 2016 13:44 UTC (Sun)
by sprin (guest, #101377)
[Link] (1 responses)
I am exploring a system that uses SHA2-256 for OOB verification of a bundle containing a PGP pubkey, a PGP implementation, a form for a message, and some glue code that connects to a HTTP-to-SMTP relay. The idea is to offer a form for first-contact that allows a non-PGP user to send a message end-to-end encrypted with a PGP pubkey. The user receives OOB some brief instructions (brief enough to fit on a business card) and a checksum with which to verify the bundle. Having verified the bundle, they execute the bundle, enter the message and send.
I tested the system last night with a layman friend, who successfully verified the bundle with an online SHA2-256 calculator before sending a message.
Posted Jun 5, 2016 20:13 UTC (Sun)
by rmayr (subscriber, #16880)
[Link]
Posted Jun 7, 2016 23:31 UTC (Tue)
by gwolf (subscriber, #14632)
[Link]
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
http://www.research.ibm.com/quantum/
https://www.technologyreview.com/s/537041/ibm-shows-off-a...
http://www.computerworld.com/article/2501748/emerging-tec...
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!
Wolf: Stop it with those short PGP key IDs!