On 2/8/2017 10:56 AM, Panos Kampanakis (pkampana) wrote:
One correction: 1024-bit RSA/DSA is not the same security level as 256-bit
curve ECDSA or Ed25519.
But neither is a group symmetric key of any sized used for
authentication/authorization.
The point is that weaker but good enough
On 2/8/2017 8:19 AM, Mohit Sethi wrote:
Hi Mike
At least with our measurements on an 8-bit microprocessor platform,
1024-bit RSA exponentiation was extremely slow. Please have a look at
Table 1:
https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-01
I look at Table 1 the first
On 2/8/2017 7:56 AM, Somaraju Abhinav wrote:
Hi Mike,
the signature size of RSA is an issue even in the 1024 bit version.
The main wireless protocol, 802.15.4 has a PHY/MAC packet size of 127
bytes so we will have to fragment IP packets (Bluetooth LE is even
smaller at just 27 bytes). This
Somaraju Abhinav writes:
> Hi Mike,
>
> the signature size of RSA is an issue even in the 1024 bit version. The main
> wireless protocol, 802.15.4 has a PHY/MAC packet size of 127 bytes so we will
> have to fragment IP packets (Bluetooth LE is even smaller at just
One correction: 1024-bit RSA/DSA is not the same security level as 256-bit
curve ECDSA or Ed25519. To compare apples to apples you would need 3072-bit
RSA/DSA sigs which ends up being far worse in terms of sig size and performance.
Agreed that symmetric group key auth has plenty of limitations.
Hi Mike
At least with our measurements on an 8-bit microprocessor platform,
1024-bit RSA exponentiation was extremely slow. Please have a look at
Table 1:
https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-01
Also, a lot of research in the crypto community is now on faster and
more
Hi Mike,
the signature size of RSA is an issue even in the 1024 bit version. The main
wireless protocol, 802.15.4 has a PHY/MAC packet size of 127 bytes so we will
have to fragment IP packets (Bluetooth LE is even smaller at just 27 bytes).
This makes it very difficult to meet the time to