Hello people,

since all of you seem quite familiary with criptography and its tools I
would like to ask u something.

I'm implementing a server/client application: the client has to collect data
and send them to the server in a frame format (unidirectional connection).
In any frame, I added a special field for digital signature (I'm not
considering a PKI). Actually, I'm using the RSA signature mechanism (hash
and sign paradigm) with a RSA-512 bit key and the SHA-256. The reason is
that I need some speed and I don't wanna add too many bytes in my frame
(with this set-up i'm only adding 64 bytes).
Supposing that I'm sending 1000 messages every day 

The frame also presents a time field which represents when the frame was
formatted and a sample count field which is repeated any second: this should
be avoid a replay-attack. 

The man-in-the-middle attack, the integry and the non-repudation mechanism
should be countered by the digital signature.

I'm pretty sure that the weakness of all the mechanism is the key-length and
I'd like to avoid the brute force attack or the worst birthday attack...so
here's my questions. 

1. For how many days can I use a 512-bit key? Should I worry first about the
factorization problem or the fact that my adversary can recover the key from
the messages I sent? Can someone explain them with any numerical examples?

2. Are there other attacks (or troubles) I should consider? 

Thanks in advance,

Kirk


-- 
View this message in context: 
http://old.nabble.com/about-the-security-of-a-tipical-client-server-application.-tp26259295p26259295.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to