Possibly questionable security decisions in DNS root management
Alexander Klimov
alserkli at inbox.ru
Mon Oct 19 03:31:38 EDT 2009
On Thu, 15 Oct 2009, Jack Lloyd wrote:
> Even plain DSA would be much more space efficient on the signature
> side - a DSA key with p=2048 bits, q=256 bits is much stronger than a
> 1024 bit RSA key, and the signatures would be half the size. And NIST
> allows (2048,224) DSA parameters as well, if saving an extra 8 bytes
> is really that important.
>
> Given that they are attempted to optimize for minimal packet size, the
> choice of RSA for signatures actually seems quite bizarre.
Maybe they try to optimize for verification time.
$ openssl speed
[...]
sign verify sign/s verify/s
rsa 512 bits 0.000823s 0.000069s 1215.2 14493.7
rsa 1024 bits 0.004074s 0.000200s 245.4 5008.0
rsa 2048 bits 0.024338s 0.000663s 41.1 1507.5
rsa 4096 bits 0.159841s 0.002361s 6.3 423.6
sign verify sign/s verify/s
dsa 512 bits 0.000651s 0.000765s 1535.2 1306.6
dsa 1024 bits 0.001922s 0.002322s 520.3 430.7
dsa 2048 bits 0.006447s 0.007551s 155.1 132.4
--
Regards,
ASK
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list