On Sun, Aug 02, 2015 at 08:08:52PM -0600, Hilarie Orman wrote:
> For primes p and q for which p-1 and q-1 have no common factor <= n,
> probability of gcd(p, q) > 1 is very roughly 1/n.

Hi

There's a typo or two here. Assuming p!=q, we always have gcd(p,q)=1.
> 
> Therefore, 1.  Use strong primes as in Rivest/Silverman.  Simply
> described, choose large primes r and s.  Choose small factors i and j,
> gcd(i, j) = 1.  Find p such that 1+2*i*r is prime and q such that
> 1+2*j*s is prime.

This appears a generalization of safe primes (i=j=1) which aren't overly
costly to generate. In fact, OpenSSL surely uses them already for
Diffie-Hellman MODPs. If they don't I'd be surprised (and alarmed). An
added small benefit is they mitigate Pollard's 'p-1' (only a concern
should p-1 or q-1 happen to be extremely smooth).

Strong primes have a bit more structure and afford protection against
repeated encryption attacks. If, as sometimes required of strong primes
p, p+1 must have a large prime factor, they also mitigate Williams'
'p+1' algo.

> 
> Or
> 
> 2.  Find large primes p and q such that gcd(p^2-1, q^2-1) < 10^6.

That's an interesting formulation. What's the importance of 10^6?

Thanks.

--mancha (https://twitter.com/mancha140)

> 
> Hilarie

Attachment: pgppgOu9zL1ue.pgp
Description: PGP signature

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to