View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0008597 | GNUnet | core service | public | 2024-03-07 22:26 | 2025-09-22 09:10 |
Reporter | schanzen | Assigned To | ch3 | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | assigned | Resolution | open | ||
Target Version | 0.26.0 | ||||
Summary | 0008597: Use Elligator KEM in Core KX | ||||
Description | Since CORE cannot assume that TNG provides encryption, it does its own KX and we may want to protect the public key of the respective KX. Needs investigation into the Core KX if this makes sense at all. | ||||
Tags | No tags attached. | ||||
|
This probably also will affect PILS since it will have to do the encaps and key generation. The latter is the only special thing wrt elligator. |
|
Not sure if this makes too much sense for the following reasons: 1. Each messages is currently defined to have a plain text message header that can easily distinguished from random and 2. The InitiatorHello contains the following fields: 1. r_I: A random value 2. p_e: An ephemeral public key (curve point) 3. c_R: The KEM ciphertext that could be elligatorified with this big 4. H(pk_R): Could be understood to look random, but allows a simple confirmation attack 5. Encrypted data We could also apply elligator to (2.). But for (4.) even if Elligator is applied, it allows a trivial confirmation attack to distinguish this from random data. |
Date Modified | Username | Field | Change |
---|---|---|---|
2024-03-07 22:26 | schanzen | New Issue | |
2024-03-07 22:26 | schanzen | Status | new => assigned |
2024-03-07 22:26 | schanzen | Assigned To | => ch3 |
2024-03-07 22:26 | schanzen | Issue generated from: 0008596 | |
2024-03-07 22:26 | schanzen | Relationship added | child of 0008596 |
2024-03-12 12:44 | schanzen | Issue cloned: 0008630 | |
2025-03-27 09:32 | schanzen | Target Version | => 0.25.0 |
2025-03-27 09:32 | schanzen | Relationship added | related to 0009666 |
2025-07-28 19:41 | schanzen | Note Added: 0025577 | |
2025-09-16 12:06 | schanzen | Relationship deleted | related to 0009666 |
2025-09-16 12:09 | schanzen | Target Version | 0.25.0 => 0.26.0 |
2025-09-22 09:10 | schanzen | Note Added: 0025965 |