Cryptography and the Open Source Security Debate
Ben Laurie
ben at algroup.co.uk
Wed Aug 25 10:17:15 EDT 2004
lrk wrote:
> On Thu, Aug 12, 2004 at 03:27:07PM -0700, Jon Callas wrote:
>
>>On 10 Aug 2004, at 5:16 AM, John Kelsey wrote:
>>
>>
>>>So, how many people on this list have actually looked at the PGP key
>>>generation code in any depth? Open source makes it possible for
>>>people to look for security holes, but it sure doesn't guarantee that
>>>anyone will do so, especially anyone who's at all good at it.
>>
>>Incidentally, none of the issues that lrk brought up (RSA key being
>>made from an "easy to factor" composite, a symmetric key that is a weak
>>key, etc.) are unique to PGP.
>
>
> Yep. And I know that. But as my hair turns grey, I make more simple mistakes
> and catch fewer of them.
>
>
> Looks like we are batting zero here. I have seen no responses nor received
> off-list e-mail from anyone admitting to examining the open source for holes.
>
>
> My examination of RSAREF and OpenSSL code was more toward understanding how
> they handled big numbers. It appears both generate prime numbers which are
> half the length of the required N and with both of the two most significant
> bits set to one. This means the ratio R=P/Q (P being the larger prime) is
> limited to 1<R<(4/3). The actual maximum R is less and can be determined
> by examining N.
This doesn't sound right to me - OpenSSL, IIRC, sets the top and bottom
bits to 1. Of course, all large primes have the bottom bit set to one.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list