IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: DH group exchange (Re: SSH key algorithm updates)
Hi Niels,
Niels Möller <nisse%lysator.liu.se@localhost> writes:
> "Mark D. Baushke" <mdb%juniper.net@localhost> writes:
>
> > Given that OpenSSH is using group16 with sha2-256 preserves 128 bits of
> > security,
>
> How do you reason about that halving, from 256 to 128?
sha2-256 has 128 bits of security per NIST SP 800-107-rev1.
> For the key expansion, I'd expect that you can count very close to 256
> bits of entropy in the generated keys (assuming the secret dh values
> were generated randomly).
Attacks on the signature hash will only need to brute force about half
of the keyspace on average to recover the key.
> Now, you will start to get some repeated session keys, i.e., collisions,
> after about 2^128 sessions. But that has little to do with the hash
> function: if we had a crypto system which for each session generated a
> 256-bit session key from a truly random source, we'd also get collisions
> after about 2^128 sessions. But I think the conventional way to assign a
> security level to such a system is 2^256 (the difficuly of exhaustive
> key search), not 2^128.
>
> Am I missing something?
I have always been told that one should choose a signature mechanism
which provides the same number of bits of security as the asymmetric or
symmetric encryption keys.
See also:
http://csrc.nist.gov/publications/nistpubs/800-107-rev1/sp800-107-rev1.pdf
Section 4.2 table 1.
Or look at the tables in these documents:
http://www.keylength.com/en/4/
https://wiki.mozilla.org/Security/Guidelines/Key_Management
I suppose I may have been over conservative in my numbers...
-- Mark
Home |
Main Index |
Thread Index |
Old Index