Skip to content

Key distancing #382

Discussion options

You must be logged in to vote

I gather that since deriving the tweak only depends on the SSH public key, someone who knows the pk can easily reverse the distancing and recover from the tweaked keys the corresponding SSH keys (except for sign and the reversal of SHA-512 but with a custom client the hashed scalar could be used to login over SSH).

According to documentation this distancing is supposed to provide additional security on signing and encrypting using the same key. This apparently is not needed (as per links in the documentation) and if implemented as defence in depth, it is unknown whether that would be effective. It would seem that libsodium and others who provide such key conversions do not mention or impl…

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@FiloSottile
Comment options

Answer selected by covert-encryption
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants