--------------------------------------------------
From: "Sampo Syreeni" <de...@iki.fi>
Subject: Re: RSA question
On 2010-09-02, travis+ml-cryptogra...@subspacefield.org wrote:
I hear that NIST Key Mgmt guideline (SP 800-57) suggests that the RSA key
size equivalent to a 256 bit symmetric key is roughly 15360 bits. I
haven't actually checked this reference, so I don't know how they got
such a big number; caveat emptor.
I would imagine it'd be the result of fitting some reasonable exponential
to both keylengths and extrapolating, which then of course blows up...for
once *literally* exponentially. ;)
Actually it's a fairly straight forward calculation. Given the known
computational requirements for a 512-bit factoring gives a scale multiplier
for the asymptote for complexity of factoring, so it is a simple matter of
using that scalar S in 2^256 = S*O(factoring n), then length of n is very
close to 15360.
The cost-based analysis is really only valid at a single point in time, as
technology progresses is does not do so smoothly. So while the lengths given
by RSA were accurate at the time of their computation, they are no longer
accurate and need to be reanalyzed.
The different approachs are very much like the difference between a sniper
and a massive bomb to kill someone. Both will eliminate the target, but the
bomb (NIST numbers) will have significant collateral damage, the sniper
(cost based analysis) though you have to make sure you've got the right
target.
For most purposes the best solution is something between a massive bomb and
a sniper, just as for most cryptographic purposes your actual security
equivalence will be somewhere between the old cost analysis numbers and the
NIST numbers.
Joe
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com