documentation updates
This commit is contained in:
parent
a7ffdbdee0
commit
23cd287372
64
man/ccr.1
64
man/ccr.1
|
@ -1,4 +1,4 @@
|
||||||
.TH CCR 1 2014-04-08 "ccr" "Codecrypt"
|
.TH CCR 1 2015-11-07 "ccr" "Codecrypt"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
.B ccr
|
.B ccr
|
||||||
\- The post-quantum cryptography encryption and signing tool
|
\- The post-quantum cryptography encryption and signing tool
|
||||||
|
@ -250,34 +250,61 @@ security") around 2^xxx, HASH1 is used as a message digest algorithm, and HASH2
|
||||||
is used for construction of Merkle tree.
|
is used for construction of Merkle tree.
|
||||||
|
|
||||||
McEliece-based encryption schemes are formed from McEliece trapdoor running on
|
McEliece-based encryption schemes are formed from McEliece trapdoor running on
|
||||||
quasi-dyadic Goppa codes with Fujisaki-Okamoto encryption padding. Algorithm
|
quasi-dyadic Goppa codes (the MCEQD- algorithms) and on quasi-cyclis
|
||||||
name MCEQDxxxFO-HASH-CIPHER means that the trapdoor is designed to provide
|
medium-density parity-check (QCMDPC- ones) with Fujisaki-Okamoto encryption
|
||||||
attack complexity around 2^xxx, and HASH and CIPHER are the hash and symmetric
|
padding for CCA2. Algorithm name MCEQDxxxFO-HASH-CIPHER means that the trapdoor
|
||||||
cipher functions that are used in Fujisaki-Okamoto padding scheme.
|
is designed to provide attack complexity around 2^xxx, and HASH and CIPHER are
|
||||||
|
the hash and symmetric cipher functions that are used in Fujisaki-Okamoto
|
||||||
|
padding scheme.
|
||||||
|
|
||||||
As of June 2013, users are advised to deploy the 2^128-secure variants of the
|
As of November 2015, users are advised to deploy the 2^128-secure variants of the
|
||||||
algorithms -- running 2^128 operations would require around 10^22 years of CPU
|
algorithms -- running 2^128 operations would require around 10^22 years of CPU
|
||||||
time (of a pretty fast CPU), which is considered more than sufficient for any
|
time (of a pretty fast CPU), which is considered more than sufficient for any
|
||||||
reasonable setup and using stronger algorithms seems just completely
|
reasonable setup and using stronger algorithms seems just completely
|
||||||
unnecessary. Note that using stronger algorithm variants does not come with any
|
unnecessary.
|
||||||
serious performance drawback.
|
|
||||||
|
Note that using stronger algorithm variants does not come with any serious
|
||||||
|
performance drawback and protects the user from non-fatal attacks that decrease
|
||||||
|
the security of the scheme only by a small amount -- compare getting an attack
|
||||||
|
speedup of 2^20 on a scheme with 2^80 bit security (which is fatal) with
|
||||||
|
getting the same speedup on a scheme with 2^128 security (where the resulting
|
||||||
|
2^108 is still strong).
|
||||||
|
|
||||||
For comparison, 2^128 security level is very roughly equivalent to that of
|
For comparison, 2^128 security level is very roughly equivalent to that of
|
||||||
classical RSA with 3072bit modulus (which is, accordingly to the best results
|
classical RSA with 3072bit modulus (which is, accordingly to the best results
|
||||||
available in June 2013 for general public, reported to provide roughly 2^112
|
available in June 2013 for general public, reported to provide roughly 2^112
|
||||||
attack complexity).
|
attack complexity).
|
||||||
|
|
||||||
All algorithms are believed to be intractable by quantum computers, except for
|
For another comparison, a very good idea about the insane amount of energy that
|
||||||
the generic case of Grover search which (in a very idealized case and very
|
is actually needed for brute-forcing 2^256 operations can be obtained from
|
||||||
roughly) halves the bit security (although the attack remains exponential).
|
wikipedia, which estimates the size of whole observable universe (!) to around
|
||||||
Users who are aware of large quantum computers being built are advised to use
|
2^270 atoms.
|
||||||
2^192 or 2^256 bit security keys.
|
|
||||||
|
All algorithms are believed to be resistant to quantum-computer-specific
|
||||||
|
attacks, except for the generic case of Grover search which (in a very
|
||||||
|
idealized case and very roughly) halves the bit security (although the attack
|
||||||
|
remains exponential). Users who are aware of large quantum computers being
|
||||||
|
built are advised to use 2^192 or 2^256 bit security keys.
|
||||||
|
|
||||||
.SH WARNINGS AND CAVEATS
|
.SH WARNINGS AND CAVEATS
|
||||||
|
|
||||||
|
.SS General advice
|
||||||
|
|
||||||
Codecrypt does not do much to prevent damage from mistakes of the user. Be
|
Codecrypt does not do much to prevent damage from mistakes of the user. Be
|
||||||
especially careful when managing your keyring, be aware that some operations
|
especially careful when managing your keyring, be aware that some operations
|
||||||
can rename or delete more keys at once.
|
can rename or delete more keys at once. Used cryptography is relatively new,
|
||||||
|
therefore be sure to verify current state of cryptanalysis before you put your
|
||||||
|
data at risk.
|
||||||
|
|
||||||
|
.SS Current state of cryptanalysis
|
||||||
|
|
||||||
|
In a fashion similar to aforementioned `new cryptography', the original
|
||||||
|
algebraic variant of quasi-dyadic McEliece that is still in codecrypt (MCEQD*
|
||||||
|
algorithms, kept for compatibility purposes) has been broken by an algebraic
|
||||||
|
attack. Security is greatly reduced. Use the QC-MDPC variant which dodges
|
||||||
|
similar attacks.
|
||||||
|
|
||||||
|
.SS Large files
|
||||||
|
|
||||||
Codecrypt is not very good for working directly with large files. Because of
|
Codecrypt is not very good for working directly with large files. Because of
|
||||||
the message format and code clarity, whole input files and messages are usually
|
the message format and code clarity, whole input files and messages are usually
|
||||||
|
@ -288,6 +315,8 @@ easily workaround the whole problem using symmetric ciphers (for encryption of
|
||||||
large files) or hashfiles (for signatures of large files). See the
|
large files) or hashfiles (for signatures of large files). See the
|
||||||
\fB\-\-symmetric\fR option.
|
\fB\-\-symmetric\fR option.
|
||||||
|
|
||||||
|
.SS FMTSeq signatures
|
||||||
|
|
||||||
FMTSeq signatures are constructed from one-time signature scheme, for this
|
FMTSeq signatures are constructed from one-time signature scheme, for this
|
||||||
reason the private key changes after each signature, basically by increasing
|
reason the private key changes after each signature, basically by increasing
|
||||||
some counter. IF THE PRIVATE KEY IS USED MORE THAN ONCE TO SIGN WITH THE SAME
|
some counter. IF THE PRIVATE KEY IS USED MORE THAN ONCE TO SIGN WITH THE SAME
|
||||||
|
@ -307,6 +336,8 @@ large number). When the remaining signature count starts to get low, Codecrypt
|
||||||
will print warning messages. In that case, users are advised to generate and
|
will print warning messages. In that case, users are advised to generate and
|
||||||
certify new keys.
|
certify new keys.
|
||||||
|
|
||||||
|
.SS Working with keys
|
||||||
|
|
||||||
Try to always use the "-n" option before you actually import keys -- blind
|
Try to always use the "-n" option before you actually import keys -- blind
|
||||||
import of keys can bring serious inconsistencies into your key naming scheme.
|
import of keys can bring serious inconsistencies into your key naming scheme.
|
||||||
|
|
||||||
|
@ -334,6 +365,11 @@ Q: I want to sign/encrypt a large file but it took all my RAM and takes ages!
|
||||||
|
|
||||||
A: Use \fB--symmetric\fR option. See the `CAVEATS' section for more details.
|
A: Use \fB--symmetric\fR option. See the `CAVEATS' section for more details.
|
||||||
|
|
||||||
|
Q: How much `broken' is the original quasi-dyadic McEliece?
|
||||||
|
|
||||||
|
A: The private key of proposed dyadic variant by Misoczki and Barreto can be
|
||||||
|
derived from the public key with standard computer equipment.
|
||||||
|
|
||||||
.SH EXAMPLE
|
.SH EXAMPLE
|
||||||
Following commands roughly demonstrate command line usage of \fBccr\fR:
|
Following commands roughly demonstrate command line usage of \fBccr\fR:
|
||||||
.nf
|
.nf
|
||||||
|
|
|
@ -31,7 +31,7 @@ static void print_attack_warning()
|
||||||
static bool printed = false;
|
static bool printed = false;
|
||||||
if (printed) return;
|
if (printed) return;
|
||||||
err ("\n***MCEQD SECURITY WARNING***\n\n"
|
err ("\n***MCEQD SECURITY WARNING***\n\n"
|
||||||
"Security of the QD-McEliece variant was greatly reduced to less than 2^50\n"
|
"Security of the QD-McEliece variant was greatly reduced to less than 2^30\n"
|
||||||
"by an algebraic attack! The functions are kept only for compatibility.\n"
|
"by an algebraic attack! The functions are kept only for compatibility.\n"
|
||||||
"Be sure to use another encryption variant instead.");
|
"Be sure to use another encryption variant instead.");
|
||||||
printed = true;
|
printed = true;
|
||||||
|
|
Loading…
Reference in a new issue