On Mon, May 04, 2015 at 09:00:21AM -0500, jack seth wrote:
> > There is a limit of 10000:
> > #define OPENSSL_DH_MAX_MODULUS_BITS 10000
> >
> > I suggest you do not change this. It just gets slower without
> > adding security.
> >
> > I have no idea why it would freeze with something larger than
> > 13824.
> >
> > I'm not sure what is logging the size, but it might be using
> > DH_size()*8 to log it. I don't think their currently is an API
> > that returns it in bits.
> >
> >
> > Kurt
> 
> Thanks for the response.  Could you elaborate on why a larger size doesn't 
> add security?  For the sake of discussion, lets ignore how slow it would be.  
> According to section 5.6.1 of 
> http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf
>   you would need 15360+ bit to have security equal to AES256.   Is NIST wrong 
> here?  If so, why?

Everything in the chain would need to be providing 256 bit of
security, there are no ciphers that support more than 192 as far
as I know.

Once you're at 128 or above it's also far more likekly that
something other than the crypto is the weakest part, like a human.


Kurt

_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to