[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

what's the point of cryptographically signing a file, instead

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 13
Thread images: 3

File: crypto.jpg (59KB, 550x412px) Image search: [Google]
crypto.jpg
59KB, 550x412px
what's the point of cryptographically signing a file, instead of just providing its hash (e.g. sha256sum)?
>>
File: images.jpg (3KB, 98x94px)
images.jpg
3KB, 98x94px
>not signing the hash
>>
The reason digital signing is used is because it's not vulnerable to tampering, i.e. man in the middle attacks. A hash transmitted in plaintext can be changed on the fly and the end user would not know - digitally signed files are decrypted from a public key (encryption is done using a different private key), so if the file was tampered the recieving host would know immediately.
>>
>>57781631

thanks

if an attacker can temper with the hash in transit, he can also spoof the public signing key in transit (generated from his evil private key)
>>
>>57781879
>>>57781631
>thanks
>if an attacker can temper with the hash in transit, he can also spoof the public signing key in transit (generated from his evil private key)
False. Then it would not match the public key of the sender.
>>
That is possible, but keep in mind that most encrypted communications that use SSL/TLS (such as HTTPS) use public keys that have already been preinstalled on your own machine, pretty much negating that risk. This includes certificates that you might download from the web - most of them have also been signed by a parent CA (certificate authority) that your computer also trusts.
>>
File: 1477630014510.jpg (447KB, 1277x1920px) Image search: [Google]
1477630014510.jpg
447KB, 1277x1920px
Let's say i want to share a file with person X. I upload it to my web server together with its signature and my public key.

Evil hax0r r00ts my server, infects the file, creates his own signature and public key (from his private key).

User X downloads the evil file, sig, and key.

how is the above any more secure than evil hax0r r00ting my server and generating an evil checksum? not trolling, really want to know the advantage of using sig/key to insure integrity of a file vs just a vanilla checksum.
>>
>>57782022
That wouldn't work as long as the user X has your legit public key. The hacker could create a file in his name, but the recieving host would know it is a tampered file as it can not be decrypted from your public key.

If you're that paranoid about security then you should be signing files on a secure, non-public facing computer, then uploading them to your webserver which does NOT contain any keys.

A checksum would not work, because while they are relatively secure - easy to get one from a file but virtually impossible to make a different file with the same sum - they do not have any verifiable data on their own. If you want your files to be un-tamperable AND verifiable from any host that does not know anything about you - over a publically visible connection - asymmetric cryptography has to be applied somewhere.
>>
>>57782300

so user X must obtain my legit public key not from the potentially r00ted server, but by some other way?
>>
>>57782668
Getting the key from your sever is still helpful.
Whenever you release a new version of your files, the hash will be different, so there's no way for the user to know if the new version is genuine or not. But if you sign the files with a key, then the attacker would have to replace the key on the site, which is VERY suspicious.

But yes, getting the key from somewhere is is still preferable.
>>
>>57781502
this.
If you provide a hash, a malicious middleman could replace the content and the hash.

Providing a signature of the content / signing the hash allows the receiver to verify that YOU provided the original content / sent content wth hash x.
>>
>>57781487
you would have to securely provide a hash for every file you want to sign, which is harder than securely providing a single public key to use for all your files
>>
>>57784058
>you would have to securely provide a hash for every file you want to sign, which is harder than securely providing a single public key to use for all your files
If you're signing things with a key, you still need to provide a signature for each file.
Thread posts: 13
Thread images: 3


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

If you need a post removed click on it's [Report] button and follow the instruction.
If you like this website please support us by donating with Bitcoin at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties. Posts and uploaded images are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that website. If you need information about a Poster - contact 4chan. This project is not affiliated in any way with 4chan.