top | item 41172605

(no title)

arcxi | 1 year ago

sign&encrypt does not protect you either, and asymmetrical encryption is authenticated if you keep your recipient key a secret. see https://words.filippo.io/dispatches/age-authentication/

discuss

order

upofadown|1 year ago

>sign&encrypt does not protect you either...

Well actually it does if the attacker does not have access to the decryption key ... which is very much the normal case. Yes, I know about "surreptitious forwarding" but I consider the idea silly in terms of usability[1].

>asymmetrical encryption is authenticated if you keep your recipient key a secret...

This is an expression of the idea that you can just keep the recipient identity (public key) away from the attacker and prevent them from creating a valid ciphertext. The fundamental issue is that this depends on a poorly specified property of the cryptography. Any protection against an attacker being able to derive the public key is merely accidental. The author of the linked article says:

>I am confident the property holds for the X25519 recipients, and that it would hold for a hypothetical Kyber768+X25519 one,...

... but provides no explicit argument to that effect. ... and then continues:

>...but it's important not to advertise it as an age-wide property.

In practice the recipient identity key will show up on the command line and/or will be kept in an unencrypted file. Age itself treats it as a potentially public value.

If you and the recipient have the ability to share and keep a secret value secret, why use asymmetrical encryption in the first place? Why not put that value in the plaintext as discussed previously in the article? The reason that there is not more research into the security of secret recipient identities is because there is no practical value in such use.

[1] https://articles.59.ca/doku.php?id=pgpfan:forwarding