[1464] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Speeding up DH

daemon@ATHENA.MIT.EDU (Bill Stewart)
Thu Sep 11 12:21:07 1997

Date: Wed, 10 Sep 1997 23:04:17 -0700
To: cryptography@c2.net
From: Bill Stewart <stewarts@ix.netcom.com>
In-Reply-To: <199709100233.UAA20189@nyx10.nyx.net>

At 08:33 PM 9/9/97 -0600, Colin Plumb wrote:
>If you look in PGP 5, you'll see some precomputed primes with (p-1)/2
>prime, and some on-the-fly code that generates p-1/2 = k*q for k "as
>small as possible" while still ensuring that a multiple of q in the
>right range will be prime.  This bounds k small enough that the leakage
>is contained within the paranoia padding, so we don't worry about
>generator or not.

Is there any way to bully the user interface into making these visible?
There are some primes that the Photuris people picked, for several
useful sizes.

>My choice in PGP5 was to use 3*80 bits = 240 for the exponent.  No
>attack I know is better than sqrt(x), but that provides safety against
>a hypothetical future cbrt(x) attack and isn't that big a hit.
>You still get a 4x speedup.

How fast is the calculation on a typical machine, compared to the
rest of the calculations performed?  Is 4x enough to be critical?



home help back first fref pref prev next nref lref last post