[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5598 [Tor Relay]: Turn DynamicDHGroups off by default



#5598: Turn DynamicDHGroups off by default
-------------------------+--------------------------------------------------
 Reporter:  rransom      |          Owner:     
     Type:  enhancement  |         Status:  new
 Priority:  minor        |      Milestone:     
Component:  Tor Relay    |        Version:     
 Keywords:               |         Parent:     
   Points:               |   Actualpoints:     
-------------------------+--------------------------------------------------
Changes (by mikeperry):

 * cc: marsh@â (added)


Comment:

 I think choosing a random "prime" chosen from available primes of the same
 bitwidth is better for PFS, assuming the apache prime passes the same
 level of known primality tests as our ad-hoc primes pass, and also
 assuming that these primatilty tests are actually valid.

 The reason I think ad-hoc primes are better for PFS is because of the
 possibility of time-space tradeoff attacks against specific prime groups.
 Seems plausible to me that certain small-ish prime groups might have
 precomputed tables to expedite the discrete log.

 Maybe DH-1024 is too big for these types of attacks, but hey, I'm not the
 one who thinks it's actually useful to build a datacenter in Utah to
 record all data for future cryptanalysis.

 Also note: I am not a cryptographer. I just play one on tv.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5598#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs