Hi Kirk,

> I've already implemented the ECDSA scheme in my application:
> using SHA-1 and secp160k1.
In that case, consider using ECDSA.

> I'm pretty faster on the signer's side, but i'm actually
> much slower on the verification side.
Compare apples to apples: use an appropriate RSA moduli. Since you've
selected SHA-256, here are the contestants: RSA3072 vs P-256 or B-283.
If you want to test using SHA-1, use RSA1024 vs P-160 or B-163.

> Is there any real implementation who can show me how much
> time someone need to factor 512-key?
See, for example, the RSA challenges (dated) and the prime pages
(http://primes.utm.edu/). UTM seems to keep the pages up to date.
Outside of that, search SiteSeer or ask over at sci.crypt.

> So, should i worry about an attack on the SHA-1?
The security level has been reduced to somewhere around 2^50 (from an
ideal level of 2^80). See McDonald, Hawkes, and Pieprzyk's paper from
Eurocrypt 2009. I also agree with John Pierce's thinking: the threat
model should include either a well funded [agency|government], or a
distributed effort.

> Does a individual hackers have the NASA's PC?...
> I'm also getting information about special HW for for attacking
> cryptographic systems.
A more interesting question is, 'How is the attacker plugging his
hardware into NASA's network.' :)

> So, should i worry about an attack ... on the # of sent messages?
I don't believe so. I'd have to go to the HAC, but I believe the
number of messages under a key applies to encipherment and not
signatures.

Also keep in mind that FIPS recommends/requires SHA-2, which means you
can drop to SHA-224 if the 1000 messages per day are placing too much
of a burden on your server.

Jeff

On Mon, Nov 9, 2009 at 10:44 AM, Kirk81 <rigo_...@yahoo.it> wrote:
>
> Jeffrey Walton-3 wrote:
>>
>>> 1. For how many days can I use a 512-bit key?
>> 0
>>
>
> Does a individual hackers have the NASA's PC? lol, I mean I'm looking about
> the integer factorization problem and, from a SW point of view, I think only
> a comunity of PCs can solve the problem in few time (less than one day?!) .
> Am I wrong? Or can u do it with a standard PC? :-/
>
> I'm also getting information about special HW for for attacking
> cryptographic systems. Some papers (focused on the number-field sieve)
> claims to be able to hack the 512-key in less than 10 minutes, but without
> an actual implementation.
> Is there any real implementation who can show me how much time someone need
> to factor 512-key? Do you know it? cos i would like to know the currently
> lifetime (minutes? lol) of the 512-bits key.
>
>
> Jeffrey Walton-3 wrote:
>>
>> Try an elliptic curve. It will be about  8-12 times faster than RSA,
>> with a smaller signature. Since your using SHA-256, use P-256 or
>> B-233.
>> :)
>> Jeff
>>
> I've already implemented the ECDSA scheme in my application: using SHA-1 and
> secp160k1. Yep. I'm pretty faster on the signer's side, but i'm actually
> much slower on the verification side.
>
> Of course, with ECDSA, the lifetime of my key is quite longer, since HW
> attacks appear infeasible on secp160k1. So, should i worry about an attack
> on the SHA-1? or on the # of sent messages?
>
> thanks
> --

> [SNIP]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to