RE: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Christian Huitema
The attack is *relatively* easier. It is not easy. It is much harder to crack RSA than to find a matching hash. Cracking a 2048 bits RSA key probably requires on the order of 2^1024 trials, and that will take you something like forever. Cracking the hash requires only something on the order of

RE: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Christian Huitema
On the other hand, cracking SSAS is *much* easier than cracking RSA, or even cracking CGA. SSAS builds the 64 bit identifier as follow: * Pick a random 16 bit number; * Use that number as an index in the bit array representing the public key; * Extract the 48 bits

RE: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Hosnieh Rafiee
Thanks again for your response. I have some questions: - Choosing a random part of the public key does not help to increase the probability of matching the public key to the IID? if I am to improve this section and by saying we need to generate two, one byte random numbers such that the

RE: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Christian Huitema
I don't think the index helps much. I suspect that SSAS could be broken in minutes if someone did a parallel implementation on a GPU. Maybe seconds. Frankly, I believe that you have fallen in the trap of inventing your own crypto. Most of these inventions turn out to have flaws, and won't pass

Re: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Francis Dupont
In your previous mail you wrote: I don't think the index helps much. I suspect that SSAS could be broken in minutes if someone did a parallel implementation on a GPU. Maybe seconds. = you peak 2 primes for a standard RSA public key. You fix one and you divide the modulus to get an idea of

RE: security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Hosnieh Rafiee
Thanks Christian, Here is what I propose. I have an implementation of SSAS and I will try to break it to see how long it will take. (I will also share the code with others so that more people can try to break it.) Based on the mathematical calculations (of finding the expected value) the

RE: [saag] security consideration of CGA and SSAS - Ii-D action : draft-rafiee-6man-ssas

2013-03-17 Thread Christian Huitema
Santosh, I suppose we have to use more than 2048 bits for RSA then... But that's not really the point of the debate. CGA is an algorithm specified for IPv6 secure neighbor discovery and is specified in RFC 3972. CGA works by associating an IPv6 address with a public key. The public key is