You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
	
	
		
			66 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
		
		
			
		
	
	
			66 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
| 
											10 years ago
										 | From: stewarts@ix.netcom.com (Bill Stewart) | ||
|  | Newsgroups: sci.crypt | ||
|  | Subject: Re: Diffie-Hellman key exchange | ||
|  | Date: Wed, 11 Oct 1995 23:08:28 GMT | ||
|  | Organization: Freelance Information Architect | ||
|  | Lines: 32 | ||
|  | Message-ID: <45hir2$7l8@ixnews7.ix.netcom.com> | ||
|  | References: <458rhn$76m$1@mhadf.production.compuserve.com> | ||
|  | NNTP-Posting-Host: ix-pl4-16.ix.netcom.com | ||
|  | X-NETCOM-Date: Wed Oct 11  4:09:22 PM PDT 1995 | ||
|  | X-Newsreader: Forte Free Agent 1.0.82 | ||
|  | 
 | ||
|  | Kent Briggs <72124.3234@CompuServe.COM> wrote: | ||
|  | 
 | ||
|  | >I have a copy of the 1976 IEEE article describing the | ||
|  | >Diffie-Hellman public key exchange algorithm: y=a^x mod q.  I'm | ||
|  | >looking for sources that give examples of secure a,q pairs and | ||
|  | >possible some source code that I could examine. | ||
|  | 
 | ||
|  | q should be prime, and ideally should be a "strong prime", | ||
|  | which means it's of the form 2n+1 where n is also prime. | ||
|  | q also needs to be long enough to prevent the attacks LaMacchia and | ||
|  | Odlyzko described (some variant on a factoring attack which generates | ||
|  | a large pile of simultaneous equations and then solves them); | ||
|  | long enough is about the same size as factoring, so 512 bits may not | ||
|  | be secure enough for most applications.  (The 192 bits used by | ||
|  | "secure NFS" was certainly not long enough.) | ||
|  | 
 | ||
|  | a should be a generator for q, which means it needs to be | ||
|  | relatively prime to q-1.   Usually a small prime like 2, 3 or 5 will | ||
|  | work.   | ||
|  | 
 | ||
|  | .... | ||
|  | 
 | ||
|  | Date: Tue, 26 Sep 1995 13:52:36 MST | ||
|  | From: "Richard Schroeppel" <rcs@cs.arizona.edu> | ||
|  | To: karn | ||
|  | Cc: ho@cs.arizona.edu | ||
|  | Subject: random large primes | ||
|  | 
 | ||
|  | Since your prime is really random, proving it is hard. | ||
|  | My personal limit on rigorously proved primes is ~350 digits. | ||
|  | If you really want a proof, we should talk to Francois Morain, | ||
|  | or the Australian group. | ||
|  | 
 | ||
|  | If you want 2 to be a generator (mod P), then you need it | ||
|  | to be a non-square.  If (P-1)/2 is also prime, then | ||
|  | non-square == primitive-root for bases << P. | ||
|  | 
 | ||
|  | In the case at hand, this means 2 is a generator iff P = 11 (mod 24). | ||
|  | If you want this, you should restrict your sieve accordingly. | ||
|  | 
 | ||
|  | 3 is a generator iff P = 5 (mod 12). | ||
|  | 
 | ||
|  | 5 is a generator iff P = 3 or 7 (mod 10). | ||
|  | 
 | ||
|  | 2 is perfectly usable as a base even if it's a non-generator, since | ||
|  | it still covers half the space of possible residues.  And an | ||
|  | eavesdropper can always determine the low-bit of your exponent for | ||
|  | a generator anyway. | ||
|  | 
 | ||
|  | Rich  rcs@cs.arizona.edu | ||
|  | 
 | ||
|  | 
 | ||
|  | 
 |