On Thu, Jan 21, 2010 at 11:38 AM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
> At 2:17 PM -0500 1/21/10, Edward Lewis wrote:
>>At 11:05 -0800 1/21/10, Eric Rescorla wrote:
>>>I still don't understand why this implies the need for regular changes
>>>as opposed to changes triggered by personnel changes.
>>
>>I'm a bit lost following this thread now.
>>
>>For the time being, let's ignore personnel changes and whether a key is in an 
>>HSM (environment), i.e., assume there's no organizational threat to a key.
>>
>>The question is, how long does a key last?
>>
>>Meaning - if I am using an RSA-SHA256 key of 1024 bits, at what point does 
>>it's security value reach essentially 0?
>>
>>Is the point X number of signatures?
>
> No. There is no suspicion on the part of any cryptographer that I know of 
> that the number of visible signatures is significant for a 1024-bit or above 
> key.

Agreed. Recall that with PKC an attacker can generate as many
plaintext/ciphertext pairs as
he wants.


>>Is the point Y number of days?
>
> Yes, if the number of days is in the thousands (currently) and the value of 
> this key is high. Otherwise, no.

I actually sort of disagree with this. I don't see how to evaluate
this question in a meaningful
way, and it's not a cryptographic question. Let's say for the sake of
argument that we know
if requires C CPU-hours to break a key and that each CPU costs $H but
is free to run once
you own it (not true). In that case, an attacker with $D to spend can
break a single key in
C/(D/H) hours.  How long is that key secure for? Who knows. Most of
the variance is in attacker
motivation and funding, not time.



> For most keys, no, at least for the next five years or so. That is, the 
> *cost* of breaking a 1024-bit key, when that is feasible, is still much 
> higher than the value of the broken key. Remember that a broken signing key 
> is only valuable until the fact that it is broken is discovered and fixed. 
> So, even if an attacker breaks your signing key, when he/she starts to use it 
> for nefarious purposes and you discover that, you roll your key and the 
> entire time of breaking the new key must be used again before they can mount 
> another attack.

Exactly. So rolling it preemptively doesn't help much.

-Ekr


>>The "need for regular changes" stems from assumptions made in the early days 
>>of DNSSEC development that have gone pretty much unchallenged until recently. 
>> The door is open to (re)visit this topic, if anyone wants to venture 
>>opinions.
>
> See above. :-)

So, the referenced post summarizes my opinion. I don't care enough about it to
fight it to the death here, however.


>>What I'd like to hear is:
>>
>>"Crypto-expert __________ says an RSA-SHA256 key of 1024 bits is good for 
>>_______ signatures/days."
>
> If you hear that, the the value for the first variable will be worthless. You 
> have to factor in the value of the key to the attacker for the short period 
> in which they can use it before their actions are discovered and the broken 
> key is replaced.


I more or less agree with this. You may want to hear that, but there's
no meaningful answer.

-Ekr
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to