At 3:46 PM -0400 10/8/06, Cat Okita wrote:
On Fri, 6 Oct 2006, Joe Abley wrote:
This kind of advice regarding specific key lengths and lifetimes seems to change over time -- the key sizes get longer and the validity periods get shorter -- presumably as a result of ongoing research and improved capabilities of the machinery which can be used to break keys.

By specifying absolute values for the algorithm and the key size, this document leaves us only with the validity period, and changing that in many cases is going to involve talking to a customer to reissue a certificate. Talking to customers is expensive.

I would strongly suggest that if absolutely necessary, the key size and algorithm not not be fixed, but that a basic compatibility requirement should be set. All of the PXIX working group documents that I've checked through avoid the pitfall of specifying an absolute algorithm/key size - and I strongly suspect that there are far more cryptographers there than here.

As co-chair of PKIX I can explain why we don't put algorithms or key sizes into those standards, but why they are relevant here.

PKIX standards focus on formats and processing algorithms for certs and CRLs in all Internet contexts. Thus we don't make ANY algorithms, much less key sizes, standard. Different application need not use the same certs and thus can use different algorithms for cert signing/verification without imposing any interoperability issues. Also, some applications are uses in closed communities and thus different sets of users can employ different algorithms for their certs without interoperability concerns.

What PKIX does allow is publication of standards on HOW to represent info about a given algorithm in a cert. So, for example, we say how to represent RSA, DH, DSA, and EC DSA algorithms and associated parameters. We also cite appropriate hash algorithms and the OIDs that represent the use of one of these hash algorithms with a signature algorithm.

In the SIDR context, we are discussing a single application, and for use in the public Internet, it helps immensely if the same algorithm is used everywhere. However, it is fair to say that we could avoid algorithm references in a SIDR cert profile, which could be used in closed Internets as well as the public Internet, and just put the algorithm and key size info into a CP for the public Internet instance of SIDR.


Steve

_______________________________________________
Sidr mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/sidr

Reply via email to