views:

324

answers:

7

In standard use of asymmetrical cryptographic system, encryption is done with public key, decryption with private key.

Inversing the process, "encryption with private key" is called "signing".

Standard tools, despite terminology and lack of direct tools, allows to implement encryption system that would use the private key for encryption.

Could anyone explain clearly why such solution is vulnerable?

User Case:

Consider that Alice wants to send to Bob some stuff in a non-traditional way:

Alice and Bob once met and Alice gave Bob a "public key" generated from a private key she created BUT she warned Bob to keep it secret. AND she kept secret the private key, and didn't ever give to anyone else the public key.

Could Bob be sure that messages he receives from Alice (provided these are encrypted by Alice private key) are only readable by him (provided he really kept his copy of Alice's public key secret)?

And how compares this encryption solidity to the traditional way, which would, in our case, be Bob sending messages (encrypted by the public key of Alice) to Alice?

What the question is about

The fact that asymmetrical keys are named "private" and "public" doesn't help understanding my question. Keys have underlying properties, and it's me broadcasting the "public key" that gives it its "public" property. Please make this distinction clear before answering: I'm not considering the "public" and "private" properties of these keys but the solidity of the "private key" encryption versus "public key" encryption.

I cannot use another terminology even if it is misleading in this special case.

I know that this case is non-traditional, and could lead to several inconsistency, or is not the point of the asymmetrical crypto systems as Bob and Alice here share some sort of a common secret and that's not the point of asymmetrical crypto.

I saw several Stackoverflow answers which suggest that "private key" and "public key" are exchangeable (just read below answers). This is not true for RSA as it is trivial to generate the public key from the secret key and this is guaranteed not to be computationally feasible in the other way round. For non-believers, the process of key generation in openssl with RSA is:

  1. generate a secret key
  2. extract the public key from the secret key.

If there are so big differences between "private key" and "public key", is there a solidity difference between "private key" encryption versus traditional "public key" encryption?

Short answer from long selected answer

Misunderstanding on what exactly is the "private key" wasn't helping me. There's two different definition of "private key". The "practical private key", and the "theoretical private key".

Theoretical private key from RSA theory shares mathematical symmetricity with public key:

  • You cannot deduce one from the other
  • Encryption is equally solid in either way

Practical private key from RSA tools (like openssl) contains additional information for efficiency reason, and often, a part of the public key is even set by convention. These assumptions breaks the symmetricity:

  • It is trivial to get public key from "pratical private key"
  • But encryption remains equally solid

For more detail, see the selected answer ! Please comment if misconceptions remains...

Edit note:

  • Asymmetrical crypto system key pairs are frequently advertised as swappable (even in current stackoverflow answers), I try to bring reflexion around the fact that it could be dangerous misunderstanding as it isn't the case in REAL life tools.
  • Added the user case, I hope this will clarify my question
  • Added final 'short answer'
+6  A: 

Simply because when you encrypt something, you are masking it so that only one person can read it (the person with the private key). You do not possess that person's private key, all you have is their public key.

If you are encrypting it with your private key, anyone can decrypt it with your public key - this is the principle of signing - they can tell that it was encrypted by your private key!

Richard
I was not clear enough, but my question considered the "public key" as a non-public resource.
vaab
Why would you redefine the standard terminology? A 'public key' is something that can be shared by multiple people. That's the definition of 'public key'. Anything else is very confusing.
Jonathan Leffler
'public key' is not public (at creation), it is you broadcasting it that bring it to the "public" state. I agree this is confusing, I'd rather use another terminology if possible, but unfortunately I don't know other words for these.
vaab
+3  A: 

To put it a little more explicitly, 'encryption with a private key' means that to decrypt you need to use the public key. This isn't an issue, except that anyone can then decrypt your [insert item here], since the public key is just that: public. It isn't useful to protect data, this system is used to verify data.

For instance, Alice wants to send a file toBob (yea, yea, shoot me). Alice doesn't care if anyone else can read her file, it's not confidential, but she wants Bob to be sure that what she sent is what he recieved. She can then encrypt her file with her private key, and Bob can decrypt the file on his end with her public key, ensuring that the file hasn't been tampered with. But if someone else is listening in to the transaction, they can also decrypt and read the file. They just can't change it.


For the case you provide, a better way would be exchanging keys when they meet so that there are actually two keypairs. You yourself mentioned that RSA in particular doesn't actually workr if you try to encrypt with the public key because of optimisations made in the algorithm. I wouldn't be entirely surprised if this is a common case with other algorithms. They are designed to be run one way (private/encrypt, public/decrypt) and are a known "expensive" operation, therefore they likely to be heavily optimised in reality.

Other than that, I don't see any security concerns with your plan... As long as the keys are truely kept private. Private/public are just common names based on typical usage. There's nothing forcing you to make a public key fully public. In your case you may like to term them 'encryption key' and 'decryption key', but I wouldn't use each key for both. Infact, I'd recommend you did term them such inside your program, for the reasons given by Jonathan Leffler in his comments:

A 'public key' is something that can be shared by multiple people. That's the definition of 'public key'. Anything else is very confusing

Matthew Scharley
but why this process (signing) usually involves only a digest of the message and not the full message ? Is it only because you don't need more and it is a costly operation ?
vaab
That's pretty much it. It's costly (compared to symmetric encryption), and anyone can decrypt it anyway, so to minimise the cost, a hash of the message is used, which minimises the amount encrypted but still maintains security to a reasonable level.
Matthew Scharley
A: 

I don't know if there are some copyright concerns but I'll quote "Valery Pryamikov" from this forum.

Signature and Encryption are two different prototypes with different security requirements that among other require different padding modes. Use phrase "decrypt with public" key was the biggest obuse of terminology in history of cryptography that was widespread by Bruce Schneier's book "Applied Cryptography". The phrase it self were supposed to be used to describe signature schemes with message recovery (such as RSA). This phrase was also used to adjust asymmetric encryption and signature to old protocol verification models such as BAN. However, by it self this is just a missnomer - public key is known to everybody and decrypt operation has meaning of providing privacy to the content - which is impossible if decryption key is known to everyone.

Even so raw RSA allows interchange of public and private key, but in reality they can't be interchanged. Private key decryption is implemented with using CRT (chinese remainder theorem) to provide 4x better performance of private key operation. For that - you need not only exponent, but also factorization of modulus and multiplicative inverses of some product these factors. Public key has only modulus and exponent and can't be used with such calculation.

vaab
A: 

You're misusing the terms here.

If the keys are truly private and public, then yes, anything encrypted with the private key can only be decrypted by the public key, but if the key is truly public, anyone can decrypt that.

Let's disregard that.

The problem here is what Bob knows. Does Bob actually know if Alice sent her public key to anyone else? If not, he can not ensure that only he can decrypt the message. There is nothing in the technology that ensures this. Anything encrypted by Alices private key can be decrypted by her public key, and thus by anyone in possession of that key. By the very nature of public keys, that should be anyone.

The only way to ensure that a message for Bob is only decryptable by Bob is for Bob to give Alice his public key, and make Alice encrypt everything she wants to send to Bob by his public key, which will make the data un-decryptable by anyone except Bob. Whether she also encrypts the same data by her private key (ie. signs the data) is besides the point.

Of course, again, Bob, cannot know that Alice did not send the exact same message to anyone else, encrypting it for others public keys.

Lasse V. Karlsen
+4  A: 

In standard use of asymmetrical cryptographic system, encryption is done with public key, decryption with private key.

It depends on who is doing what. Suppose Alice wants to send a message to Bob that only Bob can decode. Alice encrypts the message using Bob's public key (under the standard definition of 'public key', meaning the one that is known to people other than its owner). Now only someone who knows Bob's private key (presumably, the only person who knows Bob's private key is in fact Bob) can decrypt Alice's message to Bob.

If Alice wants Bob to know that only she could have sent it, she can encrypt the message with her own private key, assuming Bob knows her public key, either before or after encrypting the message with Bob's public key. Let's assume she encrypts the message with her private key, then the result with Bob's public key. To read the message, Bob has to decrypt the message with his (Bob's) private key, and then decrypt the result again with Alice's public key. If what he reads is now sensible text, he knows that someone who knows both Alice's private key (presumably Alice) and his public key (could be anyone at all) sent the message.

In practice, the asymmetric algorithms are expensive to compute, so what you really do is choose a random session key of an appropriate length and an agreed upon standard symmetric encryption algorithm such as AES. Then the main message is encrypted with the (relatively fast) symmetric algorithm and sent as one part of the message. The other part of the message is the encrypted - or doubly encrypted - random session key. Bob can decrypt the session key section of the message to obtain the session key; he then uses that to decrypt the main part of the message.

Note that if you are sending a message to many people, you can use one encryption of the message proper, and then encrypt the session key once for each recipient, using the recipient's public key. Each recipient can only decrypt the session key information using the key that belongs to them, but all can actually decrypt it. If the message is substantial (say 2 MB of PDF), then this is much more economical than separately encrypting the message with each recipients public key.

Inversing the process, "encryption with private key" is called "signing".

No; signing is a separate operation. If you read Schneier's "Practical Cryptography", you'll see that the authors suggest using one public/private key pair for encryption, and a second pair for signature work. For example, a signature encrypts a fixed length hash of the original message using the private key from the signing key. Anybody who knows the public key part of the signing key can then decrypt the signature to obtain the hash of the original message. Presumably, the same recipient can also decrypt the message (using the public key of the signature key pair), and then can check that the hash of the message received matches the hash derived from the signature. Any mismatch indicates a problem and the message should be discarded.

There are many ways to do these things - depending on the security requirements.

But the basic point is that one person knows the private key of an asymmetric key, and potentially many people know the public part of the asymmetric key (and this is perfectly safe). Data can be encrypted by the sender using the recipients public key; it may also be encrypted by the sender using their own private key. The recipient can decrypt the received message using their own private key and, if necessary, using the sender's public key.


The question, even as amended at about 2009-09-05T13:00-07:00, is not completely coherent, IMNSHO.

You should read chapter 13 "RSA" in "Practical Cryptography" (probably after reading some of the earlier chapters too - most notably section 3.3 Public-Key Encryption).

Notation for Encryption and Decryption

Let's define a bit of notation for discussing orthodox public key cryptography. Let's start with basic symmetric encryption:

  • C = E(K,m) is the encrypted message (cipher text, C) generated by encryption algorithm E using key K on (plain text) message m.
  • P = D(K,C) is the plain text message (plain text, P) discovered by decryption algorith D using key K on (encrypted) message c.
  • To be a working system, m = P, so D(K,E(K,m)) = m.

So far, this notation applies to symmetric encryption because the same value K is used in both encryption and decryption. Anyone who knows K (and the algorithm, but Kerckhoff's Principle that 'secrecy is in the keys' means that you assume the attackers know the algorithm - any contrary assumption is cryptographic 'snake oil') can decrypt the message.

With an asymmetric encryption system, Ea and Da are the encryption and decryption methods for algorithm A. The key distinguishing feature of an asymmetric cryptographic cipher is that the key Kencrypt used by Ea is different from the key Kdecrypt used by Da. Further, to be practical, it must be computationally infeasible to deduce Kdecrypt even if you know Kencrypt and vice versa.

With asymmetric encryption, Alice creates a pair of keys, (Salice, Palice). Conventionally, Salice is the secret key and Palice is the public key. Note that Alice knows both keys. All that matters is:

  1. Salice and Palice are different.
  2. Alice does not let anyone else know about one of the keys (Salice); it is crucial that this information is not known to anyone else.
  3. Alice can let other people know about the other key (Palice) without compromising the security of the system.

Similarly, Bob will create a pair of keys, (Sbob, Pbob). Note that:

  • Bob knows the keys Sbob, Pbob, and Palice.
  • Alice knows the keys Salice, Palice, and Pbob.

Alice sends a message to Bob

Now, when Alice wants to send a message, Malice-bob, to Bob so that Bob can read it (but no-one else can), she has to encrypt it with Bob's key Pbob. So, she creates a message:

  • Calice-bob = Ea(Pbob, Malice-bob)

Bob knows (from external evidence) that the message was encrypted with Pbob, so he knows that he must decrypt it with Sbob:

  • Malice-bob = Da(Sbob, Calice-bob)

However, at this point, all he knows about the message is that it came from someone who knew his Pbob key. He does not know that it came from Alice except via extrinsic evidence.

If Bob and Alice agree that their messages must be encrypted such that they are both confident that the message received came from the other, then both must be confident that no-one other than Alice knows Salice and that no-one other than Bob knows Sbob. They must also be confident that Palice is known to Bob and Bob must be confident that Palice really does belong to Alice, and that Pbob is known to Alice and Alice must be confident that Pbob really does belong to Bob. Establishing these trust relationships is a lot of what PKI (public key infrastructure) is about.

Assuming that these criteria are met, then Alice can send her message to Bob in such a way that Bob is confident that only Alice could have sent it. As outlined previously, the mechanism is a double encryption:

  • C1alice-bob = Ea(Salice,Malice-bob)
  • C2alice-bob = Ea(Pbob,C1alice-bob)

Alice sends C2alice-bob to Bob (along with some signature or MAC to confirm that it was not corrupted in transit), and then Bob computes:

  • D1alice-bob = Da(Sbob,C2alice-bob)
  • D2alice-bob = Da(Palice,D1alice-bob)

If everything has gone according to plan, D2alice-bob = Malice-bob.

Mechanics of RSA Key Pairs

The RSA encryption algorithm is based on the fact that if you have two publicly known numbers (which are two parts of one public key), the exponent e and the modulus n, then given a message m, it is easy to compute c = me mod n. However, it is computationally infeasible to deduce m given just c (and e and n). If, however, you know another exponent, d, then you can magically calculate r = cd mod n, and r = m if you have computed e, d and n appropriately. It is not feasible to compute d from e and n without knowing some other information.

Under the RSA encryption scheme, you start work with two (large) randomly determined prime numbers, p and q, and their product is n. The RSA algorithm is predicated on the fact that it is extremely difficult to factor n (determine p and q given just n); if anyone ever finds an easy way of factoring large numbers, then the RSA algorithm is instantly broken.

Once you have n, you need to determine exponents e and d such that:

  • ed = 1 mod t where t = LCM(p-1, q-1), and LCM is the least common multiple.

You can choose one of the two values as a small odd number - Schneier and Ferguson suggest e = 3, for example. You then calculate d using some computations that they cover in about 6 pages of their book. Typically, d will be a rather large number. You can then publish the pair (e, n) as the composite public key, keeping the values (p, q, t, d) secret as the private key. Given e and n, it is not computationally feasible to deduce d without first factoring n. "Practical Cryptography" suggests using two different pairs (e1, d1) and (e2, d2), derived from the same value n, where you use e1 to encrypt messages, and e2 for digital signatures; they even suggest using the values 3 and 5 for these.


OpenSSL and Key Generation

Your description of how the RSA keys are generated by OpenSSL is confused, I believe.

The generation process first has to generate to large random prime numbers, p and q in the notation above. There are stochastic methods for determining whether a given large number is (probably) prime; it takes a little while to compute two such prime numbers. Taken together, these are used to compute first n, and then d (assuming e is established by some convention). The two stages you see in OpenSSL are determining n, and then determining d.


Dissection of User Case

The question says:

Consider that Alice wants to send to Bob some stuff in a non-traditional way:

Alice and Bob once met and Alice gave Bob a "public key" generated from a private key she created BUT she warned Bob to keep it secret. AND she kept secret the private key, and didn't ever give to anyone else the public key.

So far, so good. The 'public key' isn't very public, but there's no harm in that.

Could Bob be sure that messages he receives from Alice (provided these are encrypted by Alice private key) are only readable by him (provided he really kept his copy of Alice's public key secret)?

If the encryption technology is of any use, then yes; only Alice and Bob can read the message that Alice encrypted with her secret key because only Alice and Bob know the public key that goes with her secret key.

And how compares this encryption solidity to the traditional way, which would, in our case, be Bob sending messages (encrypted by the public key of Alice) to Alice?

Confusion: the section started by discussing Alice sending messages to Bob; now you've switched to Bob sending messages to Alice.

When Bob and Alice met, Alice gave Bob her Palice public key. Presumably, Bob also gave Alice his Pbob public key. And both public keys have very limited public circulation - that's good, but not crucial to the security of the system.

Now, when Bob wants to send a message to Alice, he can encrypt it with her Palice public key, and Alice (and only Alice) can decrypt the message using her Salice secret key. Alternatively, Bob could encrypt the message with his Sbob secret key, and Alice could decrypt it with Bob's Pbob public key. Both sets of encryption and decryption would work.

What the question is about

The fact that asymmetrical keys are named "private" and "public" doesn't help understanding my question. Keys have underlying properties, and it's me broadcasting the "public key" that gives it its "public" property. Please make this distinction clear before answering: I'm not considering the "public" and "private" properties of these keys but the solidity of the "private key" encryption versus "public key" encryption.

It is equally reliable to encrypt with the correct private key and decrypt with the correct public key as it is to encrypt with the correct public key and decrypt with the correct private key. The difference is in who can do which operation. If you understand clearly who is doing the encrypting and who is doing the decrypting, and who knows which keys, then the secrecy of the methods become fairly clear.

I cannot use another terminology even if it is misleading in this special case.

Well, the 'public keys' in your case are not all that widely known, but that's all that's unusual about it.

I know that this case is non-traditional, and could lead to several inconsistency, or is not the point of the asymmetrical crypto systems as Bob and Alice here share some sort of a common secret and that's not the point of asymmetrical crypto.

The whole point of asymmetric encryption schemes is that it does not matter whether the attackers (classically called Eve, the eavesdropper) knows the public key. As long as the private keys are kept private by Alice and Bob, the messages can be sent securely. However, you must understand that if Alice sends a message to Bob that is encrypted only by Alice's secret key, then anyone (such as Eve) who knows Alice's public key can read the message. Eve can't create a fake message that purports to come from Alice unless she also knows the secret key - if Eve discovers Alice's secret key, Eve can pretend to be Alice at any time she likes. But she can read it. If Alice sends a message to Bob that is encrypted only by Bob's public key, then only Bob can read the message (using his secret key), but Bob has no way of knowing whether it actually came from Alice or whether Eve sent it pretending to be Alice. That's why you have to work hard to ensure that Bob knows that only Alice could have sent the message, and Alice knows that only Bob can read the message.

Jonathan Leffler
could you show me the openssl command line (for example) to encrypt a file (or the session password file) with a private key as you stated: "Alice [...] can encrypt the message with her own private key". I missed this command.
vaab
Offhand, no, I can't. I wasn't describing what `openssl` can do; I was describing what the abstract public key encryption technology can do. Only your most recent edit of the question mentions OpenSSL. I will cogitate upon the issue - I'm not about to promise an update to my answer.
Jonathan Leffler
You write: "Further, to be practical, it must be computationally infeasible to deduce Kdecrypt even if you know Kencrypt and vice versa.". This is in contradiction with the fact that it is trivial to get the public key from the private key in RSA. (openssl rsa -in key.pem -pubout -out pub.pem)And can you source: "It is equally reliable to encrypt with the correct private key and decrypt with the correct public key as it is to encrypt with the correct public key and decrypt with the correct private key." ? (in the case of RSA) as this is what my question is about.
vaab
My dear @vaab, you are misunderstanding things. The RSA public key consists of (e, n); the necessary parts of the private key are (d, n), but the values (p, q) can be kept too (so n and t can be recalculated too). And, given that the private key holder has the extra information, the private key holder can regenerate the public key exactly as they did at the start. If all the private key holder retains is the value (d, n), and they lose the values of (p, q), it is no more computationally feasible for the private key holder to compute (e, n) from (d, n) than it is for an attacker to do so.
Jonathan Leffler
Ok, you are right. I was clearly misleaded by the fact that openssl calls "secret key" the numbers (d,n) but also (p, q) and others. In practical cases, this behavior is shared by many tools for efficiency purpose, with the added fact that 'e' is also often the same by convention (0x10001).Thus, knowing 'n', the 'secret key' owner can deduce the complete public key quite easily in several cases.But regarding the proper restricted definition of the public and private key, which is (e,n) and (d,n), they shares a symmetrical relation and thus confers the same cryptographic solidity either way.
vaab
+1  A: 

I think that you are missing the point of public/private key encryption (at least as I understand it).

In the situation you have, symmetric encryption would work just as well. The reason to use non symmetric encryption is a matter of scale.

Say you have, not just Bob and Alice, but imaginary people for every letter of the alphabet. These people want to be able to send messages to anyone, ensuring sure that only the recipient can read it. Using a normal, symmetric encryption, this would require a shared key between every person, so if we have the 26 people from the alphabet town, that is 26x25 keys, with every person having to remember and secure 25 secret keys.

Enter symmetric (aka public/private key) encryption. Now every person has a private key, and a public key, with the normal rules. To send a message to Fred, you look up his (and there is only one) public key. Then you send him the message. Only Fred can read this message. In this scheme, you have 26x2 keys, and each person only needs to remember and secure 1 secret key. There also needs to be a source of public keys, but this is easy.

Using asymmetric encryption the way you describe, with a pair of keys for every set of people, would then require 26x25x2 keys.

So again, it is about scalability. The number of keys needed for symmetric schemes is N^2-N, where in asymmetric schemes, it is only 2*N.

Mike Cooper
A: 

For crying out loud people just answer the question! Is this a who knows the most p1ssing context or what!

The answer is quite simply that:

If you use the private key then anyone with the public key can read it. So what have you achieved exactly?

If you use the public key then only the holder of the private key can read it.

Get it now?

Justin