Implementation guides for DH?
Zulfikar Ramzan
zramzan at ipdynamics.com
Wed Jan 1 18:07:50 EST 2003
Hi Adam --
Anton Stiglic has a paper on various security issues that arise in DH
implementations:
http://crypto.cs.mcgill.ca/~stiglic/Papers/dhfull.pdf
The paper not only considers number-theoretic attacks, but also looks at
other vulnerabilities (side-channel attacks, timing attacks, DoS, etc).
Section seven has a nice summary of various secure DH implementation
principles.
Hope this helps!
Regards,
Zully
P.S. If you come across any other pointers, please let me know.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Zulfikar Ramzan
IP Dynamics, Inc. http://www.ipdynamics.com
Secure, Scalable Virtual Community Networks
-----Original Message-----
From: owner-cryptography at wasabisystems.com
[mailto:owner-cryptography at wasabisystems.com]On Behalf Of Adam Shostack
Sent: Wednesday, January 01, 2003 10:54 AM
To: cryptography at wasabisystems.com
Subject: Implementation guides for DH?
I'm looking for a list of common implementation flaws in DH. Things
like: How to check the key the other side sends, what are acceptable
values for p, etc?
Any pointers?
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to
majordomo at wasabisystems.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list