IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
issues
Niels Provos writes:
> 2. the choice of private exponents for the diffie-hellman should depend
> on the size of key material for the negotiated ciphers, i.e.
> 256-bit AES requires longer exponents than 128-bit AES.
>
> this applies to both the transport and the diffie-hellman group
> exchange draft.
If you let the 256-bit AES to mandate the used Diffie-Hellman group
then you will end up with a group with p > 2^13547 (say). This is
something that seems quite unreasonable from the performance
viewpoint. Changing the exponent size is not enough.
(The usual 1024-bit Diffie-Hellman group gives security level similar
to a 80-bit block cipher. Here exponent must be more than
160-bits---increasing it would not give any more security, but
decreasing it would indeed decrease security.)
Perhaps a better solution is to give the user some indication of the
security level achieved in a particular session. Of course, it is
difficult to measure security exactly, but this is only required to be
a rough approximation (say, `very secure` > 2^128, `secure' > 2^80,
`broken' <= 2^80, when measured in elementary operations).
Best regards,
Mika Kojo
SSH Communications Security Corp
Home |
Main Index |
Thread Index |
Old Index