PlayStation 3 predicts next US president

Ian G iang at systemics.com
Thu Dec 6 10:26:48 EST 2007


dan at geer.org wrote:
> If on the one hand, the correct procedure is sign-encrypt-sign,
> then why, on the other hand, is the parallel not sign-hash-sign ?

What is "correct" depends on requirements and semantics, and 
neither is well addressed in that paper nor in standards, 
w.r.t. email and signing.

https://financialcryptography.com/mt/archives/000905.html

Ditto, in terms of your question.

As an example (Ricardian Contract [1]), we might say that a 
signed contract is done as

    hash-digsig-hash

[2] With this procedure, the first hash-digsig is a human 
signing (classical cleartext openpgp signature) and the last 
hash is a signature that causes sharing of the exact 
document [3].


iang



[1] To complete the picture, even this evidence is 
distributed by means of transactions over the document;  to 
be extreme, the end result is this:

     hash-digsig(hash-digsig(hash-digsig-hash))

[2] a public key signature is normally done hash-digsig, 
right?  So your sign-hash-sign might really be:

     hash-digsig-hash-hash-digsig

but that's a guess.

[3] http://iang.org/papers/ricardian_contract.html




> --dan
> 
> =============
> 
> http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.ps
> 
> Donald T. Davis, "Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM,
> PGP, and XML.", Proc. Usenix Tech. Conf. 2001 (Boston, Mass., June
> 25-30, 2001), pp. 65-78.(180 Kbytes) (PDF, 200 Kbytes) (HTML, 80 Kbytes)
> 
> Summary of the paper.
> 
> Abstract: 
> Simple Sign & Encrypt, by itself, is not very secure. Cryptographers
> know this well, but application programmers and standards authors still
> tend to put too much trust in simple Sign-and-Encrypt. In fact, every
> secure e-mail protocol, old and new, has codified naïve Sign &
> Encrypt as acceptable security practice. S/MIME, PKCS#7, PGP, OpenPGP,
> PEM, and MOSS all suffer from this flaw. Similarly, the secure document
> protocols PKCS#7, XML- Signature, and XML-Encryption suffer from the
> same flaw. Naïve Sign & Encrypt appears only in file-security and
> mail-security applications, but this narrow scope is becoming more
> important to the rapidly-growing class of commercial users. With file-
> and mail-encryption seeing widespread use, and with flawed encryption in
> play, we can expect widespread exposures.
> 
> In this paper, we analyze the naïve Sign & Encrypt flaw, we
> review the defective sign/encrypt standards, and we describe a
> comprehensive set of simple repairs. The various repairs all have a
> common feature: when signing and encryption are combined, the inner
> crypto layer must somehow depend on the outer layer, so as to reveal any
> tampering with the outer layer.
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
> 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list