[12199] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Implementation guides for DH?

daemon@ATHENA.MIT.EDU (Zulfikar Ramzan)
Wed Jan 1 18:17:09 2003

From: "Zulfikar Ramzan" <zramzan@ipdynamics.com>
To: "Adam Shostack" <adam@homeport.org>,
	<cryptography@wasabisystems.com>
Date: Wed, 1 Jan 2003 15:07:50 -0800
In-Reply-To: <20030101185342.GA3000@lightship.internal.homeport.org>

Hi Adam --

Anton Stiglic has a paper on various security issues that arise in DH
implementations:
http://crypto.cs.mcgill.ca/~stiglic/Papers/dhfull.pdf

The paper not only considers number-theoretic attacks, but also looks at
other vulnerabilities (side-channel attacks, timing attacks, DoS, etc).

Section seven has a nice summary of various secure DH implementation
principles.

Hope this helps!

Regards,

Zully

P.S.  If you come across any other pointers, please let me know.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Zulfikar Ramzan
IP Dynamics, Inc. http://www.ipdynamics.com
Secure, Scalable Virtual Community Networks


-----Original Message-----
From: owner-cryptography@wasabisystems.com
[mailto:owner-cryptography@wasabisystems.com]On Behalf Of Adam Shostack
Sent: Wednesday, January 01, 2003 10:54 AM
To: cryptography@wasabisystems.com
Subject: Implementation guides for DH?


I'm looking for a list of common implementation flaws in DH.  Things
like: How to check the key the other side sends, what are acceptable
values for p, etc?

Any pointers?

Adam


--
"It is seldom that liberty of any kind is lost all at once."
					               -Hume



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to
majordomo@wasabisystems.com



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post