On May 17, 2013 11:29 AM, "David Vorick" <[email protected]> wrote:
>
> Why are so many bits necessary? Isn't 128bits technically safe against
brute force? At 256 bits you are pretty much safe from any volume of
computational power that one could fathom within this century.

It sounds like you might be mixing up public key and symmetric ciphers.
128 bits is indeed fine for a symmetric cipher, though if you think quantum
computing is around the corner you want 256.

But for public key ciphers, you're not worried about brute force searches:
you're worried about factoring (for RSA-based stuff) or about discrete
logarithms (for DH-based stuff including ElGamal, DSA, etc etc etc).
Opinions differ on adequate key length, but may folks think that 2048-3072
bits is about right for RSA or for DH in Z_p*, whereas 192-256 bits is
about right for DH in elliptic curve groups. Some conservative folks want
more bits; some brave folks want fewer.

-- 
Nick
_______________________________________________
tor-dev mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to