For low security we have SECP160R1 from:
[SECG] SECG, "Recommended Elliptic Curve Domain
Parameters", SEC 2 , 2000,
<http://www.secg.org/>.
I went there yesterday to look up some of the information on actual
sizes and got to:
http://www.secg.org/download/aid-784/sec2-v2.pdf, published Jan 27, 2010.
And no SECP160R1, the smallest keysize now is SECP192R1 (sec 2.2.2).
So we have a reference problem here as well as giving a developer the
parameter values needed to implement SECP160R1.
Corrective action options:
1) Directly supply the parameters for SECP160R1 in Appendix D and
reference the version of secg they were pulled from.
2) Find a more stable source for SECP160R1 to reference.
3) Move to SECP192R1 (which I am leary of as ver 3.0 of secg could drop
that!).
I vote for 1) and ask whoever has the older version of secg to forward
the parameters for inclusion.
BTW, HIP DEX works a bit differently in that the keys generated from the
ECDH exchange are only used in protecting HIP packets and a wrapped key
exchange within HIP provides the keying material for session keys (eg
ESP or 802.15.4 security). So in DEX, using SECP160R1 may not be as
much of a risk as in BEX, so I DO plan on providing the SECP160R1
parameters in DEX.
_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec