[Cryptography] How often should the DH group be changed?
Pierre Abbat
phma at bezitopo.org
Wed Mar 12 02:16:38 EDT 2025
On Tuesday, March 11, 2025 2:26:46 AM EDT Peter Gutmann wrote:
> What's your threat model? Without that, the answer is "anything from never
> to every time there's a new connection".
The data are valuable when produced and for about a day after. By a week
after, they are used up and no longer worth anything. If, however, the
adversary figures out how to compute discrete logs in the group, it can
eavesdrop on future messages, until the group is changed.
A government has hired Eve to tap the connections between nodes. Since the
keys agreed to by DH are used for link encryption, I'm ignoring the
possibility that Mallory could run a node and thus gain access to messages
that pass through her node but are intended for someone else.
On Tuesday, March 11, 2025 9:51:50 AM EDT Sebastian Stache via cryptography
wrote:
> It might be tempting to change public constants in an effort to increase
> resistance to brute force attacks, pre-imaging and such, but I would
> recommend to increase the sizes (of primes, keys and hashes) instead.
> Also, how would you distribute the new group to all clients?
Clients don't need the group, only nodes do. Every client has (or should have)
a local connection to a node (or be on the same computer as a node).
Pierre
--
The Black Garden on the Mountain is not on the Black Mountain.
More information about the cryptography
mailing list