[147301] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA equivalent key length/strength

daemon@ATHENA.MIT.EDU (Bill Frantz)
Wed Sep 25 19:10:45 2013

X-Original-To: cryptography@metzdowd.com
Date: Wed, 25 Sep 2013 15:55:10 -0700
From: Bill Frantz <frantz@pwpconsult.com>
To: cryptography@metzdowd.com
In-Reply-To: <CAMm+LwizpPs4TeN89GvqFiu1TD5LaS=OE4xL0uHy4EQ2Qr9tUg@mail.gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 9/24/13 at 4:58 PM, hallam@gmail.com (Phillip Hallam-Baker) wrote:

>And the problem appears to be compounded by dofus legacy implementations
>that don't support PFS greater than 1024 bits. This comes from a
>misunderstanding that DH keysizes only need to be half the RSA length.
>
>So to go above 1024 bits PFS we have to either
>
>1) Wait for all the servers to upgrade (i.e. never do it because the won't
>upgrade)
>
>2) Introduce a new cipher suite ID for 'yes we really do PFS at 2048 bits
>or above'.
>
>
>I suggest (2)

Agreed, however eventually we will want to do (3):

(3) Make insecure obsolete servers show as insecure in the 
user's UI or refuse to communicate with them. Embedded systems 
are the Achilles Heel of this suggestion. The only way to 
upgrade them is to replace them, which might be too costly.

Cheers - Bill



-----------------------------------------------------------------------
Bill Frantz        |The nice thing about standards| Periwinkle
(408)356-8506      |is there are so many to choose| 16345 
Englewood Ave
www.pwpconsult.com |from.   - Andrew Tanenbaum    | Los Gatos, 
CA 95032

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post