Security Basics mailing list archives
Re: Encryption question
From: "D.E. Chadbourne" <235u () comcast net>
Date: Wed, 03 Mar 2004 08:46:25 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Joerg Over Dexia wrote: | Am 14:49 02.03.2004 +0100 teilte F.O. Bossert mir folgendes mit: | ->But that is his point! Sending an Fake message with an fake | hash, with | ->real public key and fake private key, | ->does give the receiver the false impression that the message is | from Alice! the person you're pretending to be needs a new fake key that you can make others think it's you intended vic. you can't use "part" of the key combination. here's a quote from http://www.gnupg.org/gph/en/manual.html#CONCEPTS "Key tampering is a major security weakness with public-key cryptography. An eavesdropper may tamper with a user's keyrings or forge a user's public key and post it for others to download and use. For example, suppose Chloe wants to monitor the messages that Alice sends to Blake. She could mount what is called a man in the middle attack. In this attack, <read this slowly, it's important> Chloe creates a new public/private keypair. She replaces Alice's copy of Blake's public key with the new public key. She then intercepts the messages that Alice sends to Blake. For each intercept, she decrypts it using the new private key, reencrypts it using Blake's true public key, and forwards the reencrypted message to Blake. All messages sent from Alice to Blake can now be read by Chloe." hope this helped. GnuPG rules! - -eric. - -- Secure Linux Computing http://235u.home.comcast.net/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAReGxLlZzXRl+JnERAiSDAKCNwChB0H3ayhhV8W583+Ay/DwibwCg11Hy pXhCa6xomwZyj4xVSrO1l2A= =JC0t -----END PGP SIGNATURE----- ---------------------------------------------------------------------------Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040303
----------------------------------------------------------------------------
Current thread:
- RE: Encryption question David Gillett (Mar 01)
- <Possible follow-ups>
- RE: Encryption question Marco Araujo (Mar 01)
- Re: Encryption question F.O. Bossert (Mar 02)
- Re: Encryption question Joerg Over Dexia (Mar 02)
- Re: Encryption question D.E. Chadbourne (Mar 03)
- Re: Encryption question F.O. Bossert (Mar 02)
- RE: Encryption question Daniel Menezes (Mar 02)
- RE: Encryption question Preston, Tony (Mar 02)
- Re: Encryption question Hector Luis Gimbatti (Mar 03)
- RE: Encryption question Daniel Menezes (Mar 04)
