Fast DH parameters generation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all,

I am working on an application that would use DH to allow exchanging 
symmetric keys (not a TLS app), and we noticed that we could use two 
different approaches to generate the parameters.

The first option is to use the DH_generate_parameters_ex() + 
DH_generate_key() - but that takes quite a long time when using 2048 
bits DH.

The second option, instead, is to generate DSA parameters and then copy 
them as DH params - i.e., using DSA_generate_parameters_ex() + 
DSA_dup_DH() + DH_generate_key().

Of course, the second approach is a lot faster - however, can anyone 
explain the warning not from the documentation "Be careful to avoid 
small subgroup attacks when using this." ? AFAIK, for such attacks to be 
effective, they require that the parameters are re-used multiple times. 
However, in our specific case, the generated parameters will be used 
only once (2048 bits) and then discarded...

Cheers,
Max




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux