On Tue Aug 20 09:00:56 2013, shay.gue...@intel.com wrote:
>
>
> OpenSSL’s DH implementation uses an unnecessarily long exponent,
> leading to significant performance loss
>
> OpenSSL handles the Diffie Hellman (DH) protocol in a very
> conservative way. By default, the length of the private key equals
> to the bit-length of the prime modulus. For example, DH2048 will
> use a 2048-bit exponent (and two such exponentiations are executed
> for a key exchange).
>
> This is an overkill: NIST suggests that 224 bit exponent is sufficient
> for 112 bit security (which is what DH2048 offers).
>
> There is no API to specify the exponent’ length when generating the
> key. However, there is a parameter in the DH struct, which that
> defines the size of the exponent:
>

The -dsaparam option to dhparam converts DSA parameters to DH and sets the
length parameter.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to