Lemmy.ca
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Soatok Dreamseeker@pawb.social to Cryptography @ Infosec.pub@infosec.pubEnglish · 1 month ago

Practical Collision Attack Against Long Key IDs in PGP

soatok.blog

external-link
message-square
2
link
fedilink
  • cross-posted to:
  • lobsters@lemmy.bestiver.se
8
external-link

Practical Collision Attack Against Long Key IDs in PGP

soatok.blog

Soatok Dreamseeker@pawb.social to Cryptography @ Infosec.pub@infosec.pubEnglish · 1 month ago
message-square
2
link
fedilink
  • cross-posted to:
  • lobsters@lemmy.bestiver.se
Practical Collision Attack Against Long Key IDs in PGP - Dhole Moments
soatok.blog
external-link
In response to the GPG.Fail attacks, a Hacker News user made this claim about the 64-bit “Long Key IDs” used by OpenPGP and GnuPG, while responding to an answer I gave to someone else&#…
  • Em Adespoton
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    2
    ·
    1 month ago

    It’s not a collision attack though; the person has to control both long key IDs.

    Let me know when they can generate a collision against a known ID.

    • Natanael@infosec.pub
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 month ago

      That IS a collision attack

      You’re talking about first preimage

      https://en.wikipedia.org/wiki/Preimage_attack

Cryptography @ Infosec.pub@infosec.pub

crypto@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !crypto@infosec.pub

Questions, answers, discussions, and literature on the theory and practice of cryptography

Rules (longer version here)

  • Stick to cryptography / infosec
  • Be a good netizen - be kind, act in good faith, maintain high quality, don’t mislead
  • Link directly to original sources
  • Don’t use us to cheat on challenges or tests!
  • Crypto review requests must show the algorithm
  • CTF / challenges and puzzles must use modern crypto
  • Avoid making duplicate posts
  • All use of AI / LLM and their prompts MUST be disclosed in your submissions and comments

##Related resources;

  • Reddit cryptography forums 1 & 2; /r/crypto /r/cryptography
  • Cryptology ePrint archive
  • Discussion site for ePrint papers
  • Libera Chat’s IRC:s #crypto - (IRC protocol URL)
  • Metzdowd cryptography mailing list
  • Randombit cryptography mailing list
  • StackExchange cryptography community
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 5 users / week
  • 18 users / month
  • 77 users / 6 months
  • 12 local subscribers
  • 588 subscribers
  • 90 Posts
  • 59 Comments
  • Modlog
  • mods:
  • SqueamishOssifrage@infosec.pub
  • Trusted Third Party@infosec.pub
  • BE: 0.19.15
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org