> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Patrick Patterson
> Sent: Thursday, July 17, 2008 8:04 AM
> To: openssl-users@openssl.org
> Subject: Re: Prime number generation on FreeBSD-sparc64
> 
> 
> On July 17, 2008 10:48:51 am Yuliya Shulman wrote:
> > I'm not using OpenSSL to generate the list of primes. OpenSSl is using
> > it in the following path:
> >
> > RSA_generate_key() - in rsa_depr.c
> > RSA_generate_key_ex() in rsa_gen.c
> > rsa_builtin_keygen() in rsa_gen.c
> > BN_generate_prime_ex() in prime.c
> > BN_is_prime_fasttest_ex() in bn_prime.c
> >
> That's probably exactly what you should be doing.
> 
> Since the table of primes previously mentioned tops out at around 
> 30bit primes 
> (and there are 50 Million of those)... and modern cryptography 
> suggests at 
> least 4096 bit primes, you are completely doing the right thing 
> by not using 
> a table.

ONLY IF he's using LARGE primes.  He hasn't said if he is or not.
Meaning, in the algorithim cited, he would be requesting much
larger than a 64 bit prime.

He's actually been extremely coy about what exactly he is
doing, and has just let us make assumptions. :-)  Nor did he
respond to my statement challenging whether he is generating small
primes or not. :-)  Which is why I warned him about it.  The
only thing he's said is that openssl is using the primes, during
a key generation of some kind, so we can assume it's some kind of
crypto app.

Your assuming he is generating large keys, but he has not given
any indication that he is, in fact, doing this.

> (Just to make it clear - an application using those 
> tables would be 
> trivially crackable - and not just by reverse engineering the code :)
>

As would an application that was using a small key, randomly
generated though it might be.

If he IS in fact running some app that uses insecure, small keys,
then it's pointless to generate primes when he can randomly
select from a table of them.  Either way, the "security" in
the application is "feel good" and does nothing towards making
the app actually secure.

Ted
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to