[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [minion-cvs] clarified the subheader section



I think that there is no security problem with that approach, since the 
secret used is only recoverable by the node. There is only an 
engineering/extensibility issue which is only partially relevant to 
mixminion. For some reason the address has to be recovered before the 
"Shared secret" can be computed you are in a deadlock situation. The 
obvious question would then be: why/how the hell could that happen?

It turns out that this is one way of providing "forward secure" mixing. 
Which means that after a certain amount of time any opponent who has 
intercepted material and can force mixes to decrypt it cannot do it any 
more.

More information is contained in a paper I am writing right now that you 
can find a pre-alpha version at:

http://www.cl.cam.ac.uk/~gd216/fsmix.pdf
(not for distribution please!)

Otherwise I am happy with the scheme.

George

On Wed, 5 Jun 2002, Roger Dingledine wrote:

> On Wed, Jun 05, 2002 at 08:27:58PM -0400, Nick Mathewson wrote:
> > >  The Routing Extension corresponding to a particular subheader is
> > >  encrypted using the Encrypt function with key=Hash(Shared Secret,
> > > -``ROUTING EXTENSION SECRET KEY'') and appended to the RSA encrypted
> > > +``ROUTING EXTENSION SECRET KEY'') and appended to the RSA-encrypted
> > >  subheader.
> > 
> > Claim:  There's no reason to use a separate key for the routing
> > extension.  Instead, use Hash(Shared Secret || "HEADER SECRET KEY") to
> > encrypt all of the header from the Extensions through the end.
> > 
> > I have this working in CVS.
> 
> Works for me.
> George?
> 
> --Roger
>