On 17 Dec 2024, at 13:40, James Bottomley <[email protected]> wrote:
> I admit, since you would most > need to execute this over the lifetime of a key and store as many > signatures as you can, that it's a nation state type of attack rather > than a quick hacker infiltration one. But these are also the types of > attack we need to guard against. The type of attack that you’re describing appears at first glance to have no better probability of success than random chance. If you could calculate how much better than random such a method might be, it would help us all understand how seriously to take the possibility. But even if it were worth considering, adding random salt would be expected to *decrease* the chances of a digest collision, so it would be an argument *for* salting. A
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ Gnupg-devel mailing list [email protected] https://lists.gnupg.org/mailman/listinfo/gnupg-devel
