> Clifford Heath wrote:
> > You simply need to increase the number of rounds of primality testing,
> > say, double it. That doubles the cost, and each extra round approximately
> > halves the chance of getting a non-prime.

> No, adding one round halves the chance.

Isn't that exactly what I said?

> > However I find this odd, because here we have these 1024 bit primes chosen
> > from what we consider to be a space containing very roughly 2^128 primes
> > (i.e. our 1024 bit prime contains ~128 bits of entropy)
> Eh? Why do you say that?

We use them in cipher suites with 128 bit encryption, and consider that the
attack cost is of a roughly similar order.  I know it's only ballpark,
but it's still an indication of the amount of information that must be
brute-forced.

> > but OpenSSL only
> > uses 50 rounds of primality testing doesn't it? Which means that only 1 in
> > 2^78 "primes" actually are primes. Has anyone considered the attacks that
> > might be possible due to these non-primes?

> What it means is that there's a 1 in 2^50 chance (or perhaps 1 in 2^100)
> that any particular prime is actually not prime.

Aarrrgh. It must be Monday morning. I'll try to engage my brain before
speaking again...

------------------------------------------------------------
Clifford Heath                    http://www.osa.com.au/~cjh
Open Software Associates Limited       mailto:[EMAIL PROTECTED]
29 Ringwood Street / PO Box 4414       Phone  +613 9871 1694
Ringwood VIC 3134      AUSTRALIA       Fax    +613 9871 1711
------------------------------------------------------------
Proven Solution Deployment for the Global Enterprise
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to