IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: DH group exchange (Re: SSH key algorithm updates)



Niels =?utf-8?Q?M=C3=B6ller?= <nisse%lysator.liu.se@localhost> writes:

> "Mark D. Baushke" <mdb%juniper.net@localhost> writes:
> 
> > For now, does it seem reasonable to add RFC 3526 group15 & group16 to
> > the protocol?
> >
> >   diffie-hellman-group15-sha256 (3072-bit MODP group ~130 bits of securit=
> y)
> >   diffie-hellman-group16-sha256 (4096-bit MODP group ~150 bits of securit=
> y)
> 
> I think it makes sense. It's good to have some specified algorithms
> with security a bit beyond what's currently used, to make it easy to
> move if/when needed attacks on the current algorithms emerge.

Agreed.

> Next question is what status they should have. I think it makes sense to
> have group15 as RECOMMENDED.

I agree with this suggestion.

> (By the same argument, I think it makes sense to specify some
> alternative to sha256 too, which I guess would be either sha512 or
> sha3-384 (sha384 makes litte sense to me, since it's essentially a
> truncated sha512, with same performance and shorter output)).

Given your point about sha2-384, I think there are three possibilities
that remain:

  sha2-512
  sha3-256
  sha3-512

There are aguments both in favor and against each of the alternatives.

fwiw: I have no idea if the SSH community is ready to consider the use
of sha3 (FIPS PUB 202 style) at this time, but it is more likely to
be a challenge to the attacks on diffie-hellman I heard of to date.

	-- Mark



Home | Main Index | Thread Index | Old Index