Multiple keys/methods per key exchange (e.g. multi-md5-sha1-md4 at libssh.org) Re: [PATCH] curve25519-sha256 at libssh.org key exchange proposal
Roland Mainz
roland.mainz at nrubsig.org
Wed Sep 25 07:39:57 EST 2013
On Tue, Sep 24, 2013 at 10:21 PM, Aris Adamantiadis <aris at 0xbadc0de.be> wrote:
[snip]
> I've worked this week on an alternative key exchange mechanism, in
> reaction to the whole NSA leaks and claims over cryptographic backdoors
> and/or cracking advances. The key exchange is in my opinion the most
> critical defense against passive eavesdropping attacks.
> I believe Curve25519 from DJB can give users a secure alternative to
> classical Diffie-Hellman (with fixed groups or group exchanges) and
> NIST-approved elliptic curves.
[snip]
... that reminds me of an old idea (note: I'm no expert in this
stuff... which means the idea may be total nonsense... or not... :-)
):
Is it usefull to combine multiple hash algorithms/methods for a key exchange ?
The idea would be to use something like "md5" and "sha1" in a key
exchange (and append the hash sums) ... individually there are
obsolete and more or less cracked or have serious weaknesses, but if
the hash sums are combined (e.g. appended... *NOT* XOR'ed !) it would
be near impossible to exploit the known weaknesses for reasonable
small data.
AFAIK the advantages would be:
- Existing hardware acceleration for md4/md5/sha1 can be used
- Even using something like md5+sha256 would mean additional
protection against weaknesses in either of the hash sum methods
- All algorithms can be executed in parallel (either different CPUs or
different crypto engines)
Note that the whole thing is not limited to two keys/methods, in
theory there could be something like
"multi-md5-sha1-md4-sha256 at libssh.org" to use md5, sha1, md4 and
sha256 hash sums.
Question is now... how mad/bad is the idea ?
----
Bye,
Roland
--
__ . . __
(o.\ \/ /.o) roland.mainz at nrubsig.org
\__\/\/__/ MPEG specialist, C&&JAVA&&Sun&&Unix programmer
/O /==\ O\ TEL +49 641 3992797
(;O/ \/ \O;)
More information about the openssh-unix-dev
mailing list