Hi Panos:
There seems to be some misunderstanding regarding computational
complexities here (here: Special Number field Sieve (SNFS) vs. General
Number Field Sieve (NFS)).
With the General Number Field Sieve, the complexity is conjectured to be
LN[c,a], where
a= 1/3 and c = (64/9)^{1/3}+o(1) and where
LN[c,a]:=exp(c (log N)^a (log(log(N))^{1-a}).
With the Special Number Field Sieve, the conjectured complexity is
LN[c,a], where
a= 1/3 and c = (32/9)^{1/3}+o(1).
Note that if one ignores the o(1) term, then the asymptotic running time
using the GNFS with N is about the same time required with the SNFS and
N^2.
The paper you quoted exploits some potentially hidden structure in the
method for producing N that results in being able to use the SNFS rather
than the GNFS (thereby, explaining the relatively low running time). The
paper's premises were already known in the '90s, where the only thing
the paper added was using the best sieving methods known to the authors
in 2016. The paper does not apply to parameters that were not concocted
in a special way: to my knowledge, there are no results that would show
otherwise.
(There are some other complexity results, with a=1/3 and c somewhere in
between [(32/9)^{1/3}, (64/9)^{1/3}] as well, see, e.g., [1], which
results in some scaling along [N,N^2] interval.)
Conclusion: your reference to the paper is misleading regarding
state-of-the-art. {I do concur that elliptic curves outperform RSA, but
that is another matter entirely.}
Rene
[1] DLP - the Number Field Sieve for Integers of Low Weight (Oliver
Schirokauer, Math.Comp., 2010)
On 2/9/2017 12:37 PM, Derek Atkins wrote:
Hi,
On Thu, February 9, 2017 12:20 pm, Panos Kampanakis (pkampana) wrote:
About factoring 1024-bits,
https://hal.inria.fr/hal-01376934/file/paper.pdf shows that a special
1024-bit p was factored in 2 months. Also it explains that it is possible
to factor some primes used on the internet today. Going to 1024 gives a
false sense of security. Endorsing it in a standard to be used for some
years down the road makes me uncomfortable. 256-bit ECDSA or EdDSA are
more sufficient with good performance compared to RSA1024.
Please do not mix up 1024-bit Diffie-Hellman and 1024-bit RSA. They are
different mechanisms and depend on different underlying math. Everything
you say above is about DH, which just does not apply when we're discussing
RSA. You cannot "Factor a Prime"; by definition a prime's factors are 1
and itself (e.g. 11).
Yes, it is possible to create a DH-prime that allows easy solutions to the
discrete-log problem. And yes, it's easy to create an RSA key that's
easily factored. However, factoring a "good" 1024-bit RSA key is not "2
months" of effort. c.f. https://en.wikipedia.org/wiki/RSA_numbers for a
list of numbers and references to their factoring efforts over the years.
Yes, 256-bit ECC is more secure than 1024-bit RSA (128-bit security vs
80-bit security). I cannot comment on the performance difference; I've
been focusing on WalnutDSA which verifies orders of magnitude faster than
either RSA or ECDSA.
-derek
--
email: [email protected] | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace