Update of "keyrevokation"
Not logged in

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview

Artifact ID: f1886a2353b2551aaa3d5cc9ec7bd7cdd15b9d29
Page Name:keyrevokation
Date: 2014-04-28 00:33:03
Original User: bernd
Parent: ba1ff1982ac9eda4085114d2357b393055c6cda2 (diff)
Next 616431c3c2901599d5bb63b1315ae39e550a0765
Content

Key Revocation

Key revocation (for PKIs without certification authorities) usually is done with a signature of the lost key, i.e. both the owner and the adversary can revoke a compromised key.  However, the important function in case of a revocation is declaring the successor key, which reestablishs trust. To do that, you must actually proof that you are the legitimate owner of the exposed secret key, so how do you do that?  After all, the adversary has stolen it!

Therefore, the requirements are as follows:

I create two random number s1 and s2.  Using these numbers, I create pubkeys p1=base*(s1) and p2=base*(s2).  I compute (s)=(s1*p2) as "work secret" (i.e. the secret key that is proving my identity), and p=base*(s), my pubkey.  I publish p and p1, which together are stored as identity.  The assumption is that p1 can't be reversed to get s1, and p won't reveal s.  An attacker who stole s can't guess s1, because he doesn't have p2, and so it's even more difficult to get s2.  An attacker who stole s can generate a new pair of p1, p2, but that would give him a different identity (a suspicious identity, though).  After generating the key, s1 is destroyed; it is no longer needed, though it can be recomputed using s and p2 and the extended euclidean algorithm.

I keep s2 as offline copy (it's just 64 hex digits), and s as protected online copy in my device; s is subject to attacks and backdoors, and therefore at risk.  To revoke a key, I publish p2, which the recipient can validate by p1*(p2)==p.  

To sign a new key, I use s2 as signature key, i.e. the recipient can use the just published p2 to verify the transition to the replacement key.  Of course, the new key also has a signature with s, the old key.  The format of the revocation attribute is actually <new pubkeys: pnew, p1new><p2, sig using s2><sig using s>.  Both signatures must have the same signing date, and a never expiration date (a revocation doesn't expire).

An alternative way would be to create a signature key (which would be s2), and use that to sign the working key.  Cross-signing would still prevent identity theft if just the signature key is stolen.