Hi,
Thanks for a nice explaination Joshua!
As a solution, since g is supposed to fall in the multiplicative group of
order q OR 2q, the g can be therefore adjusted such that it satisfies either
of [g^q mod p = 1] or [g^2q mod p = 1].
Since that can be found in a deterministic way, setting up
On Wed, Jul 09, 2008 at 05:53:42PM +0530, Nilay Tripathi wrote:
As a solution, since g is supposed to fall in the multiplicative group of
order q OR 2q, the g can be therefore adjusted such that it satisfies either
of [g^q mod p = 1] or [g^2q mod p = 1].
When p is a safe prime, a few things
fips-1.1.2 does not have validation for Diffie-Hellmann.
Which version are you looking at?
-Kyle H
On Tue, Jul 8, 2008 at 2:57 AM, Nilay Tripathi [EMAIL PROTECTED] wrote:
Hi All,
I have a query regarding FIPS compliance for Diffie-Hellman api's in the
openssl stack.
FIPS uses the
fips-1.1 is not available, fips-1.1.1 is revoked, fips-1.1.2 is
current (without DH), fips-1.2.0 is currently submitted for
validation. Steve M (of the OSS Institute, which is the sponsor for
the validation) stated that the fast-tracking of the fips-1.1.2
validation was possible because of the
Thanks very much Kyle !!
Lemme see if I can make some progress with that 1.2.0 code-base on this.
- Nilay
On Tue, Jul 8, 2008 at 5:17 PM, Kyle Hamilton [EMAIL PROTECTED] wrote:
fips-1.1 is not available, fips-1.1.1 is revoked, fips-1.1.2 is
current (without DH), fips-1.2.0 is currently
On Tue, Jul 08, 2008 at 03:27:08PM +0530, Nilay Tripathi wrote:
Generating 'p' randomly as a safe prime and using 'g' order as 5, the
keys generated are not consistently passing Sec 5.6.2.4 KAT test.
It would be a good idea for you to understand why this is, rather than
just iterate until it