On Mar 1 2010, Eric Rescorla wrote:

[...] If a key is breakable at cost C in M months, then it's breakable
at cost Cx in M/x months.

This isn't true in general (although it may be sufficiently so in the
cases under discussion). In particular, not all stages of NFS factorisation
attempts are easily distributable to many small processors. The sieving
stage is, but distributing the matrix reduction stage is much harder (and
a hot research topic).

Recommended background reading: http://eprint.iacr.org/2010/006.pdf

Even if you do think this is true, it would be far more effective to simply use
fractionally larger RSA keys. My understanding is that the major obstacle to
using (for instance) 1100-bit RSA keys is that NIST only accepts a small
number of concrete key sizes for FIPS 140. If so, rather than specifying
a short rollover time, perhaps NIST could address that.

Absolutely: the NIST only-powers-of-2 guidelines have had a malign influence
in the DNSSEC context, where the size of the signature so greatly exceeds
that of the data signed.

--
Chris Thompson               University of Cambridge Computing Service,
Email: c...@ucs.cam.ac.uk    New Museums Site, Cambridge CB2 3QH,
Phone: +44 1223 334715       United Kingdom.
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to