From: Pink on

"Paul Rubin" <no.email(a)nospam.invalid> wrote in message
news:7xr5qrb9x7.fsf(a)ruckus.brouhaha.com...
> "Res" <res(a)pk.com> writes:
>> Peter, I am really not using DH for secure communication here.
>> Hence my question whether a smaller prime number will do?
>
> It will not do. The security comes from the large size of the prime.
>
> Why do you want to use DH at all? Why not a shared secret key? The
> benefit of public key is when there are a large number of communicating
> parties, or when strangers want to talk to each other. If it's just two
> parties and they know each other, then use secret keys.

It's not just 2 parties. There is only one Bob in my example, but a large
number
of Alice's he sends instructions to.


From: Pink on

"Paul Rubin" <no.email(a)nospam.invalid> wrote in message
news:7xr5qrb9x7.fsf(a)ruckus.brouhaha.com...
> "Res" <res(a)pk.com> writes:
>> Peter, I am really not using DH for secure communication here.
>> Hence my question whether a smaller prime number will do?
>
> It will not do. The security comes from the large size of the prime.
>
> Why do you want to use DH at all? Why not a shared secret key? The
> benefit of public key is when there are a large number of communicating
> parties, or when strangers want to talk to each other. If it's just two
> parties and they know each other, then use secret keys.

It's not just 2 parties. There is only one Bob in my example, but a large
number of Alices he sends instructions to.



From: Pink on

"Peter Pearson" <ppearson(a)nowhere.invalid> wrote in message
news:7p2lnbF6joU1(a)mid.individual.net...
> On Fri, 18 Dec 2009 17:01:45 +0530, Res <res(a)pk.com> wrote:
>> "Joseph Ashwood" <ashwood(a)msn.com> wrote in message
>> news:uAHWm.396$8e4.97(a)newsfe03.iad...
>>>
>>> A single P of 2048 bits is good for a long time.
>>
>> This is a huge pain point for me.
>>
>> I have a maximum of somewhere around 8 to 10 bytes which can be
>> transferred from Alice to Bob (as a request). Hence my request is
>> essentially
>> going to be Alice transmitting her calculated
>> (g ** Random Number) mod Prime.
>> This means that the Prime cannot be a huge number like you suggest.
>
> By using the equivalent elliptic-curve system, you can get
> the sizes of the quantities down to 400 bits or so. If you're
> really limited to 10 bytes, I don't believe any public-key
> system will save you.
>
> I'm sorry to say the unwelcome guild-member thing, but if
> it's important that this system be secure against an
> intelligent and resourceful adversary, you really need the
> committed involvement of someone well experienced in the
> field. There are too many subtle mistakes to make, too
> many unconscious assumptions, for a casual design approach
> to stand any good chance of success.


Peter, I am programmer without much background in cryptography, but
trying to learn more.

There are existing systems where I am which aren't really secure - they
mostly use glorified XOR cryptography. Their security lies in the auditing
capability. And security is just so that a casual person will not break it.

Just as a learning exercise, I am looking at these systems &
the existing constraints & thinking of ways to make it even 10% more
secure. My ideas or solutions aren't really going to be implemented. Just
doing this in my spare time as an exercise to learn a bit more.


From: Pink on
Thank you for your patience with my 'naive' questions.

> "Joseph Ashwood" <ashw...(a)msn.com> wrote in message be at the absolute
> limit 614 bits, that will probably be "secure" for a few minutes. A better
> solution would be to move to ECDH (Elliptic Curve Diffie Hellman) and
> ECDSA where you can barely be secure at 160 bits (20 bytes), 256 bit to be
> safe. The 256 bit signature will then take up 512 bits, the short term key
> another 512 bits, using SHA-256. This is about the best that can be done
> securely. Anything smaller is weak. Using integers a quick check says the
> 10 byte version is only about 90 seconds, the elliptic curve maybe 5
> minutes, neither is anything approaching secure. Even 16 bytes of ellitpic
> curve is only a day or so.

Ok - got it.
Just out of curiousity, what will be the form of attack to crack this?

i.e. an eavesdropper knows g, P, Alice & Bob's each's generated public
key. He also knows the encrypted text.
Now what will he do in 90 seconds (of a program) to get the shared secret?
He has to guess either a or b to get to the shared secret, right?
This is the part of cryptattack I am not able to understanding - how does
the
attack happen - understanding this will probably help me to analyze security
of a solution better.


From: Pink on
Thank you for your patience with my 'naive' questions.

> "Joseph Ashwood" <ashw...(a)msn.com> wrote in message be at the absolute
> limit 614 bits, that will probably be "secure" for a few minutes. A better
> solution would be to move to ECDH (Elliptic Curve Diffie Hellman) and
> ECDSA where you can barely be secure at 160 bits (20 bytes), 256 bit to be
> safe. The 256 bit signature will then take up 512 bits, the short term key
> another 512 bits, using SHA-256. This is about the best that can be done
> securely. Anything smaller is weak. Using integers a quick check says the
> 10 byte version is only about 90 seconds, the elliptic curve maybe 5
> minutes, neither is anything approaching secure. Even 16 bytes of ellitpic
> curve is only a day or so.

Ok - got it.
Just out of curiousity, what will be the form of attack to crack this?

i.e. an eavesdropper knows g, P, Alice & Bob's each's generated public
key. He also knows the encrypted text.
Now what will he do in 90 seconds (of a program) to get the shared secret?
He has to guess either a or b to get to the shared secret, right?
This is the part of cryptattack I am not able to understanding - how does
the
attack happen - understanding this will probably help me to analyze security
of a solution better.



First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5
Prev: Public & Private Key
Next: Encryption & Authentication