zlacker

[parent] [thread] 2 comments
1. pbsd+(OP)[view] [source] 2014-12-29 16:10:25
That TLS thread is nonsense. Take Dan Boneh's latest TLS survey paper [1], and notice that 34% (!) of DHE-supporting servers still support 512-bit ephemeral primes, and virtually every server defaults to 1024 bits. Who needs fancy new cryptanalysis?

Removing DHE is a mistake. The discrete log in prime fields is fine---as fine as RSA is, anyway---and it's a handy PFS backup in the (unlikely) case deployed elliptic curves turn out to be significantly wounded.

[1] http://www.w2spconf.com/2014/papers/TLS.pdf

replies(1): >>Alyssa+K5
2. Alyssa+K5[view] [source] 2014-12-29 17:18:55
>>pbsd+(OP)
I know, right? Chilling. I could crack those (the 512-bit ones, anyway). Why on earth would we want to keep those around?

Your first sentence seems to me like an excellent reason to remove DHE altogether from TLS 1.3, considering those servers do not support, and presumably may never support, (the draft) Finite Field DHE parameter negotiation.

Discrete log in prime fields does have the index calculus problem; it won't keep being good forever, and the performance gets worse. I'm banking on having enough different backup between ECDHE over secp256r1 and X25519 over Curve25519 that any elliptic curve difficulty won't be a problem.

replies(1): >>pbsd+Va
◧◩
3. pbsd+Va[view] [source] [discussion] 2014-12-29 18:17:58
>>Alyssa+K5
When I say DHE, I mean finite field DH in general; I have no beef with replacing the old TLS DHE mechanism by the one from the ffdhe draft, with curated prime fields to work with.

Index calculus. Over prime fields it has seen essentially no major progress (beyond small complexity tweaks, some of which are useful) since 1992 with the number field sieve. Index calculus also exists for elliptic curves, under some conditions: once again, over prime fields things seem fine (modulo MOV, anomalous, etc curves). I suspect we will also have to drop RSA if the index calculus for prime field discrete logs ever improves significantly. Likewise, some efficient attack against P-256 or curve25519 has a good chance to eliminate most or all curves in that size range.

[go to top]