Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
aleph1 at securityfocus.com
aleph1 at securityfocus.com
Mon Aug 12 10:45:26 PDT 2002
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
K. Jallad, J. Katz, and B. Schneier
We recently noted that PGP and other e-mail encryption protocols are, in
theory, highly vulnerable to chosen-ciphertext attacks in which the recipient
of the e-mail acts as an unwitting "decryption oracle." We argued further
that such attacks are quite feasible and therefore represent a serious
concern. Here, we investigate these claims in more detail by attempting to
implement the suggested attacks. On one hand, we are able to successfully
implement the described attacks against PGP and GnuPG (two widely-used
software packages) in a number of different settings. On the other hand, we
show that the attacks largely fail when data is compressed before encryption.
Interestingly,the attacks are unsuccessful for largely fortuitous reasons;
resistance to these attacks does not seem due to any conscious effort made to
prevent them. Based on our work, we discuss those instances in which
chosen-ciphertext attacks do indeed represent an important threat and hence
must be taken into account in order to maintain confidentiality. We also
recommend changes in the OpenPGP standard to reduce the effectiveness of our
attacks in these settings.
http://www.counterpane.com/pgp-attack.pdf
http://www.counterpane.com/pgp-attack.ps.zip
--
Elias Levy
Symantec
Alea jacta est
----- End forwarded message -----
More information about the cypherpunks-legacy
mailing list