openpgp-notes/book/source/11-decryption.md
David Runge 707ac2f78e
Convert also drawio based SVGs to plain SVGs and use unified path
Load all plain SVGs from a unified path.

Signed-off-by: David Runge <dave@sleepmap.de>
2023-12-11 17:03:30 +01:00

12 KiB

(decryption_chapter)=

Decryption

Message decryption is the process of taking an encrypted message and recovering its plaintext. This involves multiple steps.

Implementations typically first process the PKESK and SKESK packets leading the SEIPD packet to identify *ESK packets suitable for decryption. A PKESK packet is suitable if it contains a recipient-Key ID matching a decryption (sub-) key of the user's certificate. Typically, all *ESK packets leading a SEIPD packet contain the same session key once decrypted.


Anonymous-recipient PKESK packets contain a recipient-Key ID of `0`, so if no suitable non-anonymous PKESK was found, any anonymous PKESKs are tried with any available decryption (sub-) keys (see [](decryption_anonymous_recipient)).

If no suitable PKESK packets were found, SKESK packets are tried next, meaning the user is typically prompted to enter a decryption passphrase.

Once any of these methods succeeded, the resulting session key is used to decrypt the SEIPD packet.

:class: warning

  - using expired certificate?
  - using revoked certificate?
  - using expired subkey?
  - using revoked subkey?

Passphrase-protected session key (SKESK)

Decrypting a SKESK packet to recover the session key is done by performing the encryption steps in reverse, based on a user-provided passphrase.

In both version 4 and version 6 of the SKESK packet, the user is prompted to enter a passphrase, which is passed through the S2K function described by the SKESK packet. However, the subsequent steps of the procedure are different, as described in the following sections.

SKESK v4

Here, the result of the S2K function is a symmetric key, which is either used to decrypt the encrypted session key contained in the SKESK packet, or - less commonly - used as session key directly (see ).


The "direct method" where the result of the S2K function is directly used as session key is only applicable if only one SKESK packet is present.
:name: fig-skeskv4-decryption
:alt: Diagram depicting how the S2K function is used to derive key symmetric key from the user-provided passphrase. This key is then either used directly as session key, or used to decrypt the encrypted session key.

Decrypting the session key from a version 4 SKESK packet.

With version 4 SKESK packets, which are only used with version 1 SEIPD packets, the session key is used as message key without an intermediate derivation.

(decryption-skesk4-direct-method)=

Direct-Method

In version 4 of the SKESK packet, the encrypted session key is optional. A missing encrypted session key signals the use of the "direct-method", which means, the result of passing the passphrase through the S2K function is directly used as the session key/message key.

When the direct method is used, the symmetric cipher algorithm ID of the SKESK packet dictates the cipher algorithm used to decrypt the plaintext from the SEIPD packet.

Otherwise, the cipher algorithm ID to decrypt the SEIPD packet was prefixed to the decrypted session key.

Sanitizing this algorithm ID of the decrypted session key acts as a very early quick check to verify that the used passphrase was correct. For further validation of the session key, see .

SKESK v6

With version 6 SKESK packets, the result of the passing the passphrase through the S2K function is used as initial keying material (IKM) to derive a symmetric key encryption key using HKDF as a key derivation function. The HKDF function doesn't use any salt in this step, and the info parameter is assembled from parameters of the SKESK packet.

In the next step, this symmetric key is used to decrypt the session key using AEAD. The AEAD function uses information from the associated SEIPDv2 packet as additional data. The function is also salted using the SEIPDv2's salt. The AEAD Auth Tag of the SKESK packet is used as authentication tag.

The result is the session key.

:name: fig-skeskv6-decryption
:alt: Diagram depicting the complicated process of deriving the session key from a SKESK version 6 packet.

Decrypting the session key from a version 6 SKESK packet.

Key-protected session key (PKESK)

More common than SKESK packets are PKESK packets which are used to protect the session key using an encryption key of the recipient.

PKESK v3

With version 3 PKESKs, the recipient's secret encryption (sub-) key is directly used to decrypt the encrypted session key. The Key ID of the subkey to be used is recorded in the PKESKs key-id field. A value of 0 indicates an anonymous recipient (see ).

To detect, which symmetric cipher is used to decrypt the SEIPDv1 packet later on, each public key algorithm uses a slightly different encoding to unpack the symmetric algorithm tag from the decrypted session key. See the respective sections1 2 3 4 5 of the standard. Typically, the cipher algorithm ID is prefixed to the actual session key.

:name: fig-decryption-pkesk3
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.

Decrypting the session key from a version 3 PKESK packet.

PKESK v6

The decryption of version 6 PKESK packets works quite similarly to version 3.

:name: fig-decryption-pkesk6
:alt: Depicts, how the secret-key component of the users encryption subkey is directly used to decrypt the encrypted session key.

Decrypting the session key from a version 6 PKESK packet.

Contrary to the version 3 PKESK, the encrypted session key within the version 6 PKESK does not contain the symmetric cipher algorithm used to decrypt the SEIPD packet. Instead, this cipher algorithm ID is encoded inside the SEIPDv2 packet directly.

SEIPD (v1)

Version 1 SEIPD packets MUST only be used with version 3 PKESK packets and/or version 4 SKESK packets. Any other combinations are not allowed and MUST result in a broken message.

Since SEIPD version 1 is susceptible to downgrade attacks under certain scenarios, it is recommended to use SEIPD version 2 wherever possible.

To decrypt the contents of a version 1 SEIPD packet, the session key obtained in the previous step is used. The cipher algorithm is either extracted from the decrypted session key (the algorithm ID is typically prefixed to the decrypted session key), or - in case of a SKESK packet using the direct-method - taken from the SKESKs cipher algorithm field.

Once the cipher is initialized, the whole encrypted data from the SEIPD packet is decrypted.

:class: warning

Describe the MDC which is used for modification detection.
:name: fig-decryption-seipd1
:alt: Depicts how the session key is used directly to decrypt the contents of the SEIPD packet.

The contents of the SEIPD packet are decrypted using the session key as message key.

SEIPD w/ AEAD (v2)

Preferred mode. Version 2 SEIPD packets MUST only be used with version 6 PKESK packets and/or version 6 SKESK packets. Any other combinations are not allowed and MUST result in a broken message.

Once the session key was obtained from a PKESK or SKESK, it is used to derive a message key and an IV. This is done by passing the session key through a salted HKDF function, where the salt is unique per message and obtained from the SEIPD packet.

The result is split into the message key and first half of the IV.

:name: fig-decryption-seipd2-mk-derivation
:alt: Depicts how the session key is fed into a salted HKDF to derive both the message key and the first half of an IV.

In a first step, a message key and half of an IV is derived from the session key.

Then, the contents of the SEIPDs encrypted data are split into chunks, which are processed sequentially. Each chunk is decrypted using AEAD with parameters from the SEIPD packet as additional data. For each chunk, the chunk index starting at 0 is passed into the function as second half of the IV.

All decrypted plaintext blocks are appended to form the result of the decryption process.

After all blocks have been processed, in a final AEAD step, the total number of plaintext octets gets appended to the additional data and the final AEAD auth tag from the SEIPD packet is processed.

:name: fig-decryption-seipd2-chunks
:alt: Depicts, how the message key and index-postfixed IV are used to decrypt each individual chunk of plaintext.

Each chunk is decrypted using AEAD using the message key and an IV with appended chunk index.

SED

Legacy mode, may be decrypted, but not produced.

Advanced topics

(decryption_seipd_quick_check)=

Verify successful session key decryption

SEIPDv1 packets might make use of a "quick check" mechanism to quickly verify that the correct session key was used without the need to decrypt the whole SEIPD packet. This check consists of 16 random bytes, followed by a copy of the two last bytes, which are prefixed to the plaintext. During decrypting, these 2 bytes can be compared to the 15th and 16th random byte to detect use of the wrong session key.

Since the chance to accidentally end up with matching quick check bytes albeit the use of the wrong session key is 1:65536, some implementations validate further contents of the plaintext, such as the packet headers.

The standard warns against using the quick check mechanism, as it introduces the risk of a decryption oracle. Instead, the use of SEIPDv2 is recommended, as the AEAD mechanism automatically detects use of the wrong session key early on after the first chunk has been decrypted.

(decryption_anonymous_recipient)=

Anonymous recipients

Having all recipients keys listed as part of the PKESK packets presents a metadata leakage. An observer can easily enumerate recipients of a message by comparing the PKESKs with certificates of potential recipients.

To prevent this issue, the sender can decide to add individual recipients as anonymous recipients using a wildcard key-ID / fingerprint. This is done by creating a normal PKESK packet for the recipient, but setting the recipient key field to 0 (as well as omitting the version number of the key for v6 PKESKs).

A recipient of such a message that does not find a PKESK addressed specifically to any of their keys, can then try to decrypt any anonymous PKESK packets using any of their encryption subkeys.

To reduce the number of keys to try, the recipient can skip all secret keys which do not share the public-key algorithm stated in the PKESK packet.

:class: warning

When did the decryption succeed? Describe quick check of the check sum and decryption of first few bytes of the SEIPD as test strategies.