Re: [cryptography] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

2012-03-23 Thread Jeffrey I. Schiller

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


The flip side is the parameter generation for the EC DL
cryptosystems is so complex that it will probably be safer for most
purposes to use a standardized parameter set, than to generate your
own, if your library even supports it.


Or use regular DH and generate your own parameter set, and change it
periodically.

-Jeff

___
Jeffrey I. Schiller
MIT Technologist, Consultant, and Cavy Breeder
Cambridge, MA 02139-4307
617.910.0259 - Voice
j...@qyv.net
http://jis.qyv.name
___
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFPbJ9K8CBzV/QUlSsRAvR8AKDmqdQYiXjaLHbnksUwa3CY1/xbyACeMXd6
B2znCeHmZVf1op5CB6PDHWw=
=cZpq
-END PGP SIGNATURE-
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

2012-03-23 Thread Adam Back

You know PFS while a good idea, and IMNSO all non-PFS ciphersuites should be
deprecated etc, PFS just ensures the communicating parties delete the key
negotiation emphemeral private keys after use.

Which does nothing intrinsic to prevent massive computation powered 1024
discrete log on stored PFS traffic, other than to the limited extent of
creating a fresh public key to attack on each session.

A secondary point if you are concerned about after-the-fact computational
power overtaking your stored ciphertext (PFS or not) is to avoid using
shared public crypto parameters for discrete log based cryptosystems.

Shared public parameters are also bad because there can be some reusable
precomputation or shared parameter specific optimized hardware.  The flip
side is the parameter generation for the EC DL cryptosystems is so complex
that it will probably be safer for most purposes to use a standardized
parameter set, than to generate your own, if your library even supports it.

Adam

On Fri, Mar 23, 2012 at 08:42:29AM -0400, d...@geer.org wrote:


jd...@lsuhsc.edu writes, in part:

> Even if the intercepted communication is AES encrypted and unbroken
> today, all that stored data will be cracked some day. Then it too
> can be data-mined.

What percentage of acquirable/storable traffic do you
suppose actually exhibits perfect forward secrecy?

--dan


...those who control the past control the future.
  --  George Orwell
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography