[messaging] Let's run a usability study (was Useability of public-key fingerprints)

Michael Rogers michael at briarproject.org
Sat Mar 29 05:11:39 PDT 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 24/03/14 09:57, Daniel Thomas wrote:
>> Identicons are a catastrophe for cryptographic use - there's no
>> way an average person can distinguish more than 2^20 different
>> polygonal pictures. Given one picture, it's not hard to make a
>> key whose fingerprint has the roughly the same polygons and
>> colours. Do not use!

Depending on the use case, it may be possible to work around this
limitation by including a private salt (known only to the verifier) in
the hash.

An attacker trying to match a given identicon would then have to guess
at random, without knowing how close their match was for any given
verifier, and without being able to find a good match for all
verifiers at once.

The downside, of course, is that each verifier would see a different
identicon for a given identity - it wouldn't be possible to print
identicons on business cards etc.

I guess this is analogous to the difference between fingerprints and
short authentication strings.

Cheers,
Michael

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBCAAGBQJTNrh7AAoJEBEET9GfxSfMsFUIAL1fY/0CrqudggZOeIQgg9F/
bQkED2dTNLxhzYyO/MZ0fyT5MWDjflruJ4xuu74kYcsD75n70ibPfNIgPMNUNTYQ
OcnkVqA59fMYZSqa7Oo75wRQ46kULpDaezH4B+QY3G71ePBUEWqqZ4L4/fx9o3L9
7eUE3SfzCHKzjoEXhG8ZvlHGVLnbXqJdbmSaxUYaYbQ4zIJekSjLJoOWWWCSR2VN
IsqWkVdtj+1AFjUVHXyfV7dcwpAGPIeKBZhzD3VfWOwnxNKsx9kJWl9mze37UpRJ
HN8alfnsWk5igwdgfo9CS9d/HNGJL3euokKwDlaZqH2EO0zMhcS+lPChDsXwoA0=
=BDc5
-----END PGP SIGNATURE-----


More information about the Messaging mailing list