[12769] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Diffie-Hellman 128 bit

daemon@ATHENA.MIT.EDU (Anton Stiglic)
Fri Mar 14 19:56:35 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
From: "Anton Stiglic" <astiglic@okiok.com>
To: "NOP" <nop@trapped-under-ice.com>,
	<cryptography@wasabisystems.com>
Date: Fri, 14 Mar 2003 11:10:26 -0500


----- Original Message -----
From: "NOP" <nop@trapped-under-ice.com>
To: <cryptography@wasabisystems.com>
Sent: Thursday, March 13, 2003 4:48 PM
Subject: Diffie-Hellman 128 bit


> I am looking at attacks on Diffie-Hellman.
>
> The protocol implementation I'm looking at designed their diffie-hellman
> using 128 bit primes (generated each time, yet P-1/2 will be a prime, so
no
> go on pohlig-hellman attack),

128-bit prime DH would be trivially breakable, maybe you mean that
it uses128-bit secret keys (and a larger prime, such as 512-bit prime at
least)?

In any case, you can probably get all the information you are looking
for in this manuscript:
http://crypto.cs.mcgill.ca/~stiglic/Papers/dhfull.pdf

Cheers!

--Anton



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post