Nope, it uses 128 bit primes. I'm trying to compute the discrete logarithm
and they are staying within a 128 bit GF(p) field. Sickening.

Thnx.

Lance
----- Original Message -----
From: "Anton Stiglic" <[EMAIL PROTECTED]>
To: "NOP" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Friday, March 14, 2003 8:10 AM
Subject: Re: Diffie-Hellman 128 bit


>
> ----- Original Message -----
> From: "NOP" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Thursday, March 13, 2003 4:48 PM
> Subject: Diffie-Hellman 128 bit
>
>
> > I am looking at attacks on Diffie-Hellman.
> >
> > The protocol implementation I'm looking at designed their diffie-hellman
> > using 128 bit primes (generated each time, yet P-1/2 will be a prime, so
> no
> > go on pohlig-hellman attack),
>
> 128-bit prime DH would be trivially breakable, maybe you mean that
> it uses128-bit secret keys (and a larger prime, such as 512-bit prime at
> least)?
>
> In any case, you can probably get all the information you are looking
> for in this manuscript:
> http://crypto.cs.mcgill.ca/~stiglic/Papers/dhfull.pdf
>
> Cheers!
>
> --Anton
>
>


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to