[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: speaking of keys



-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "Stephen" == Stephen Kent <kent@bbn.com> writes:
    Stephen> Also, let's remember that the key size is not the only factor in 
    Stephen> determining the security of these systems.  It's tempting to raise 

  Absolutely.

    Stephen> software implementation on a user WS/laptop where there are lots more 
    Stephen> likely ways that the security of the traffic will be compromised 
    Stephen> (other than solving the discrete log problem for a 1024-bit group) 
    Stephen> and where the performance hit will be most visible and thus may 
    Stephen> eventually motivate an individual to NOT use IPsec at all.

  I think that we can write a MAY for a smaller size (i.e. 1024). 
  The reason to pick something for the MUST is interoperability. That is the
only reason.

    Stephen> I don't have a problem with a MAY for bigger groups, but I really 
    Stephen> think it is most appropriate to focus on the management facility to 
    Stephen> allow user communities to select their own, of whatever size they 
    Stephen> feel is appropriate.

  It has been a long time since anyone has talked about APIs. 

  Bill Sommerfeld has promised to take us (IPSP specifically) down that path
again, and it is high time that we do this. I do not think that applications
writers should have to deal with DH modulus size. I think that we should have
a direct mapping that gives minimum modulus sizes for particular levels of
security.

  I don't have a problem with having a notch in the slider set for "80-bits",
which really implies a 1024-bit modulus with 3DES or 128-bit AES, with
another notch at 128.

  It would be nice if there was another unit we could use other than bits
to expose to the user, but I don't see another one that is CPU-speed
independant (not local CPU speed, but CPU speed size of attacker). 
Herman style:
  "You must be at least $$$-well funded to bother brute forcing this castle".

]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBPfESDoqHRg3pndX9AQECIgQAmMYFIwmK9U+mjmx57wIIk9+sO8YG5oN2
OhjsGlCV1bxoVdSnodvdJG37XqJs1/IXR/7Fm9tSCpFiR4I8BegXenBDileOHr4J
FGqKpP5Qp/t+u6/hwKOxm9RZET184p6OZdK3uNEPSgfLJ0zdkuYl18EO/p2KODYd
FADACpcupzA=
=UMgt
-----END PGP SIGNATURE-----