On Mon, 10 Oct 2016, Dang, Quynh (Fed) wrote:

A conclusion of the paper was "Our results are yet another reminder that 
1024-bit primes should be considered insecure for the security of cryptosystems 
based on the hardness of discrete
logarithms. The discrete logarithm computation for our backdoored prime was 
only feasible because of the 1024-bit size, and the most effective protection 
against any backdoor of this
type has always been to use key sizes for which any computation is infeasible. NIST 
recommended transitioning away from 1024-bit key sizes for DSA, RSA, and 
Diffie-Hellman in 2010 [6]."

NIST has been urging users to move away from groups with 1024- bit p and 
160-bit q  for many years now. 

Sure.

In our document, we stated that group generators "should" provide their seeds. The reason for 
having "should" instead of "shall (must)" was that anyone could run our suggested method 
to
generate their own group. A user who generates his/her own group for her/his 
own application could have a choice of publishing the seed or not.  If a user 
had a contractor/third party to
generate a group for him/her, he or she could ask for all documentation about 
the whole process. 

But why should I trust the RFC-5114 2048-bit MODP Group with 256-bit
Prime Order Subgroup? The problem of not knowing the seed remains the
same. We just think the NSA does not have a mathemathical advantage over
academia, but that's still a big unknown.

And for IKE, you cannot just generate your own groups.

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to