On Sun, 26 Nov 2000, "Derek D. Martin" <[EMAIL PROTECTED]> wrote:
> 
> > Benjamin Scott wrote:
> > >   Ummm, I believe conventional wisdom says that with modern algorithms, session
> > > encryption keys longer then 100 bits or so is just a waste of resources.  In
> > > fact, I just checked, and the FreeS/WAN website makes reference to this.
> 
> I don't think that statement is true...  GPG recommends a key length
> of 1024 bits, and suggests that keys larger than that probably don't
> really enhance security at all, but slow down decryption substantially
> (and use more CPU).

This is the length of an RSA (or Diffie/Hellman) public cryptography key,
and is not directly comparable to the symmetric "session key" of the 
resulting session. 

Recall the RSA (or DH) public/private key pair is used to encrypt and
exchange a (hopefully) random session key between the two parties.

An RSA key of length N is easier to crack than a symmetric session key
of length N. The reason is the RSA key obeys a formula that aids in the
cracking (you basically have to factor a number of order 2^N into two
prime numbers).

Current state of the art is:

  An RSA key of order 2^1024 is "too hard" to factor,

  A random symmetric session key of order 2^128 is "too hard" to guess
  by brute force.


Karl



**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to