> I'm not sure, but didn't discrete-logarithm keys scale > roughly equivalently to RSA? I think so, but I'm not sure...
and > The guidance from NIST is: > > [1] shannons of entropy needed > [2] bits of symmetric key > [3] bits of RSA/DSA/ELG > [4] bits of ECDSA/ECetc. > > > [1] [2] [3] [4] > 80 80 1024 160 > 112 112 2048 224 > 128 128 3072 256 > 256 256 ~15k 512 > > The entropy of symmetric and ECDSA/ECetc. keys scales linearly with key > length; the entropy of RSA/DSA/ELG keys scales logarithmically with key > length. > and > However, I've also been cautioned by some big names in crypto that I > shouldn't put too much stock in this: we know DLP must be at least as > hard as integer factorization, but we don't have precise numbers for how > much harder it has to be, and the tendency over the years has been for > the two to slowly converge in difficulty. > > As of now the best guidance is to think DLP is at least as hard as IFP, > but to be skeptical about how much harder. No witchcraft, just some simple math. Baltimore published: (http://www.nsa.gov/business/programs/elliptic_curve.shtml) symm. RSA ECC 80 1024 160 112 2048 224 128 3072 256 192 7680 384 256 15360 521 The generalized number field sieve(->RSA factoring) scales with bitlength to the 1/3 (http://en.wikipedia.org/wiki/General_number_field_sieve), new improvements by Joux et al (http://eprint.iacr.org/2013/400.pdf) set it to 1/4 but this so far seems limited to smaller numbers. ECC security scales with bitlength to the 1/2 (General DLP methods) If you set the scale to 160 bit ECC being at the same security level as 1024 bit RSA (presently considered marginal security) you arrive at the formula for the generalized number field sieve: n(RSA) = ((n(ECC)^1/2)/1.25)^3 The resulting table would look like this ECC(bitlength) RSA/elGamal 160 1024 256 2072 384 3807 512 5862 768 10769 1024 16579 If you presume Joux's results would apply to RSA factoring, the formula would look like: n(RSA) = ((n(ECC)^1/2)/15.9)^4 Now the resulting table would look like this ECC(bitlength) RSA/elGamal 160 1024 256 2621 384 5898 512 10486 768 23593 1024 41943 Interestingly "NIST" arrives at an estimate even in excess of the second table! So we might speculate that they either know of some improvement compared to the publicly known methods to factor RSA moduli, expect such improvement from other sources or else just want to push ECC. (I like ECC -> google "open source elliptic curve cryptography".)) Cheers Michael Anders _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users