i started a (very niche) private messaging protocol & little CLI app demo. i’m no security expert, so any feedback or questions would be appreciated.

the gist is an ephemeral message exchange without identities. the goal is ultimate deniability.

the interesting (and weird) part is that messages are encrypted but not authenticated. this means an imposter could show up if they know the shared secret. otoh this means you can deny anything you say.

  • Cipherd@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    11 hours ago

    Couldn’t you use HMAC with shared secret key to authenticate messages while keeping plausible deniability? Since the key is only supposed to be known to the 2 parties, the recipient can deduce that a message was actually sent by the sender if he did not create it himself. I think that’s what OTR was using.

    • slugr@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 hours ago

      ooh, i’ll have to think through it, but it sounds like that’d add message integrity without sacrificing deniability. also wouldn’t be much to add. appreciate the feedback!

  • JumpyWombat@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    15 hours ago

    The knowledge of a shared secret suggests that the message could be authentic. It makes more sense to use asymmetric encryptions (without signatures).

    • slugr@leminal.spaceOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      12 hours ago

      interesting point! i chose symmetric shared key because it means you can’t prove who sent what message.

      the shared secret does add some authentication, which i think is necessary. the goal is it only creates enough to be practical (a random person can’t eavesdrop), but not enough to prove things. messages themselves still aren’t authenticated by any one person.

      • JumpyWombat@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        12 hours ago

        A shared secret implies that the message was sent by someone who knows the shared secret, and that restrict the number of potential senders.

        If you mail a message with gpg, everyone knows the public key, and the message is still safe.

        • slugr@leminal.spaceOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          12 hours ago

          you’re not wrong, but that’s just the trade off that has to be made, i think. it’s the only way i can think to do it, at least. need -some- authentication for practical usability.

          your gpg example removes the deniability since it proves who wrote the message.

          • JumpyWombat@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            12 hours ago

            your gpg example removes the deniability since it proves who wrote the message.

            You confuse digitally signing a message with the sender’s private key, and encrypting a message with the recipient’s public key.

  • slugr@leminal.spaceOP
    link
    fedilink
    English
    arrow-up
    6
    ·
    23 hours ago

    also, i’m new to lemmy, so if there are any communities i should cross post this to that may be interested, please let me know!