Charles B Cranston wrote:
Doing it the hard way requires roughly 1.5 times key length
number of modular multiplies (assuming about half the bits are
ones and half zeroes) so if the shortcutted public key operation
takes 17 units of time the non-shortcutted private key operation
takes about 1500 (assuming a 1000 bit key).
>
Does this also apply to the old style keys or only in case of CRT type keys? Because, then, in any case I will have that problem when using the public key.

Not sure what you mean by old style and/or CRT type keys. If you have a public key with an exponent other than 65537 the public key operation may take longer, but I don't think that is within PKIX standards (other than 3 which does not take longer).

ok, maybe I misunderstood you. According to PKCS#1 the public key is a pair (n,e) and the private key can be respresented either as a pair (n,d) or in its Chinese Remainder Theorem form (CRT). The latter should be faster, but only applies for keys with more than two primefactors.


Also consider: what happens in the future when you want to move
to a 2048 or 4096 bit key?  Do you have to wait for a more
capable Java card to be marketed?
Yes, but I was considering your original problem of getting both
the key and the data to be encrypted into the 245 byte buffer.
As the key gets longer this problem becomes more stringent.

Well, a 2048 bit RSA key won't fit, so even now I hit the limit, but I read that 1024bit should be considerd safe till 2037 or something? so I decided to stick with 1024bit. The buffer size is defined in an ISO-standard, so changing this may not be so straight forward as launching a new card.


However, the new version also supports Remote Method Invocation that is an abstraction layer, this may take care of all the transient data stuff :-)

At this point I am developing a proof of concept, not even a prototype. So cutting some corners is ok if I have good reasons, I know where they are and what must be done to uncut them.

I could have been straight naïve and simply assumed that the v2.1 was all I had to consider.

Actually this is more El Gamal vs RSA than the elliptic group vs the
integer group, but it turns out that RSA on the elliptic group is not
very much harder than on the integer group, so you DON'T get the same
protection with a much shorter key.  But if you use El Gamal you need
to send two group elements, so the message size doubles compared to
RSA in which only one group element needs to be sent.
>
Hope all this helps!

Absolutely, this is super! Thanks!

Erik

--
Ph: +34.666334818                           web: http://www.locolomo.org
S/MIME Certificate: http://www.locolomo.org/crt/2004071206.crt
Subject ID:  A9:76:7A:ED:06:95:2B:8D:48:97:CE:F2:3F:42:C8:F2:22:DE:4C:B9
Fingerprint: 4A:E8:63:38:46:F6:9A:5D:B4:DC:29:41:3F:62:D3:0A:73:25:67:C2
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to