Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Aug 2002 13:42:48 -0700
From:      Colin Percival <Colin_Percival@sfu.ca>
To:        veedee@c7.campus.utcluj.ro
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: 1024 bit key considered insecure (sshd)
Message-ID:  <5.0.2.1.1.20020828132755.0284b2a8@popserver.sfu.ca>
In-Reply-To: <20020828232624.A9280@c7.campus.utcluj.ro>
References:  <20020828200748.90964.qmail@mail.com> <20020828200748.90964.qmail@mail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
At 23:26 28/08/2002 +0300, veedee@c7.campus.utcluj.ro wrote:
>Just out of curiosity, can anyone with access to a gigabit network run some
>tests and tell us the difference between using several different keys? Like
>1024, 1280, 2048, 4096.
>I'm curious if a bigger key really slows down the operation as Bruce Schneier
>implies ("Doubling the key size roughly corresponds to a six-times speed 
>slowdown
>in software").

   It does slow things down to that extent (assuming O(n^1.585) 
multiplication, which is typical), for the asymmetric encryption 
operations.  Once the connection is set up, symmetric encryption is used.
   Moving from 1024 bits up to 4096 bits would, on a typical machine, cause 
the connection setup to take half a second instead of a hundredth of a 
second, but beyond that there would be no difference.
   When I brought this up earlier 
(http://groups.google.com/groups?threadm=5.0.2.1.1.20020326024955.02392830%40popserver.sfu.ca) 
there was a concern about breaking v1 clients using the RSAREF library.

Colin Percival



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.0.2.1.1.20020828132755.0284b2a8>