[Cryptography] freedom-to-tinker.com: How is NSA breaking so much crypto?

Louis Kowolowski louisk at cryptomonkeys.org
Fri Oct 16 20:24:38 EDT 2015


On Oct 16, 2015, at 3:35 PM, John-Mark Gurney <jmg at funkthat.com> wrote:
> 
> Ray Dillinger wrote this message on Fri, Oct 16, 2015 at 13:39 -0700:
>> Isn't the appropriate fix making sure that different numbers get used
>> each time DH is performed?  And won't that be the appropriate thing to
>> do regardless of the key length being used?
> 
> Please go run openssl dhparam 1024 (or for more fun, 2048), and tell
> me if doing that on every connection, https session, etc, is doable?
> 
> For everyone else, it's about a second, but can take >5 seconds to
> generate a 1024 bit dh parameter...  2048 can take >47 second and this
> is on a 2.5GHz Core i7…
> 
It could be done on bootup, and the web server could have a dependency on it (sprinkle in other services as appropriate). It would (potentially) delay things slightly, but the benefits would far outweigh the loss of a few seconds.

--
Louis Kowolowski                                louisk at cryptomonkeys.org <mailto:louisk at cryptomonkeys.org>
Cryptomonkeys:                                   http://www.cryptomonkeys.com/ <http://www.cryptomonkeys.com/>

Making life more interesting for people since 1977

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20151016/249a4ffd/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20151016/249a4ffd/attachment.sig>


More information about the cryptography mailing list