----- Forwarded message from Jeffrey Kay <[EMAIL PROTECTED]> -----

From: Jeffrey Kay <[EMAIL PROTECTED]>
Date: Wed, 2 Mar 2005 11:02:42 -0500
To: FoRK Discussion <[email protected]>
Subject: [FoRK] X.509 certificate collision via MD5 collisions
X-Mailer: Apple Mail (2.619.2)

This is a pretty interesting paper -- worth reading.

>Colliding X.509 Certificates version 1.0
>1st March 2005
>Arjen Lenstra, Xiaoyun Wang, and Benne de Weger
>
>http://eprint.iacr.org/2005/067
>
>We announce a method for the construction of pairs of valid X.509 
>certificates in which the ?to be signed? parts form a collision for 
>the MD5 hash function. As a result the issuer signatures in the 
>certificates will be the same when the issuer uses MD5 as its hash 
>function.

It seems that the approach was to generate two RSA moduli that could be 
swapped but still produce the same MD5, hence the same signature.  
Another interesting question is whether, given an arbitrary modulus, 
another can be generated that produces the same MD5.  It almost seems 
like the same problem to me, so I must be missing something here.  The 
attack isn't on the public key itself since the factors necessary to 
generate the private key are still computationally hard to obtain but 
rather on the content of the certificate.  The key assumption is that 
the certificate is signed by a third party signer, which supplies the 
public key for verification.

Even as posed, this is a pretty scary paper.  You could generate a 
certificate with your legitimate content in it (distinguished name, 
etc.), get that signed by a TTP and reuse that signature on another 
certificate with content in it that masqueraded as someone else.  You 
could also conceivable just recode parts of the certificate (such as 
the length of issue) and be safe.  Since you generated the pair of keys 
that causes this to happen, you could masquerade as anyone you wanted 
as long as you got your initial certificate signed.

Pretty interesting attack.  Computationally intense in some areas, but 
definitely a viable attack particularly against downloadable browser 
plug-ins.  It reminds me of when Verisign signed a fraudulent Microsoft 
certificate;  this attack makes that much more possible.  This attack 
could end the usefulness of TTPs in many circumstances.

-- jeff

jeffrey kay
weblog <k2.com> pgp key <www.k2.com/keys.htm> aim <jkayk2>
share files with me -- get shinkuro -- <www.shinkuro.com>

"first get your facts, then you can distort them at your leisure" -- 
mark twain
"if the person in the next lane at the stoplight rolls up the window 
and locks the door, support their view of life by snarling at them" -- 
a biker's guide to life
"if A equals success, then the formula is A equals X plus Y plus Z. X 
is work. Y is play. Z is keep your mouth shut." -- albert einstein

_______________________________________________
FoRK mailing list
http://xent.com/mailman/listinfo/fork

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org         http://nanomachines.net

Attachment: pgpdUBg0HVO2f.pgp
Description: PGP signature

Reply via email to