So,  have I to generate a prime with length = 3200 bits ?, ( the
corresponding exponent will belong to 3200-bit MODP group ) in order to
generate an AES 128 session key ? ( I use 2 as generator ).

Here http://tools.ietf.org/html/rfc3526, it is said :
   "The new Advanced Encryption Standard (AES) cipher [AES], which has
   more strength, needs stronger groups.  For the 128-bit AES we need
   about a 3200-bit group [Orman01]. ..;"
in this IETF, 6 MODP groups are exposed. 3200-bit is not among this
groups...

Concretly, what should I write to obtain AES 128 session key? i Wrote
something like this ( in command line ):
*openssl dhparam -outform PEM -out dhParams.pem -2 3200*
**Then I decode dhParams.pem into internal C struct: dh. Then I call
DH_generate_key(DH
*dh);
, then DH_compute_key(unsigned char *key, BIGNUM *pub_key, DH *dh); with the
peer pub_key
and I finally want to store this session key at key


2011/4/19 Michael Sierchio <ku...@tenebras.com>

> Addendum - depending on the use of DH (usually using the DH shared
> secret as a basis for key exchange), the choice of prime is more
> important than private exponent length.  Safe primes or strong primes
> are warranted.  Most systems use small generators (e.g., 2).
>
> - M
>
> On Mon, Apr 18, 2011 at 7:25 PM, Mike Mohr <akih...@gmail.com> wrote:
> > You might take a look at RFC 3526:
> >
> > http://tools.ietf.org/html/rfc3526
> >
> > It is my understanding that the DH exponent can be significantly
> > shorter than the modulus without compromising security.  RFC 3526 is
> > from 2003, but I haven't found anything published since then that
> > would make me think its assertions are invalid or outdated.  The
> > paranoid tinfoil hat crowd can probably take twice the maximum bit
> > count from section 8 (620x2=1240) and be happy.
> >
> > Mike
> >
> > On Mon, Apr 18, 2011 at 8:01 AM, ikuzar <razuk...@gmail.com> wrote:
> >> Hello,
> >> I 'd like to know the length of DH session key generated by
> >> DH_compute_key(unsigned char *key, BIGNUM *pub_key, DH *dh) . Here :
> >> http://www.openssl.org/docs/crypto/DH_generate_key.html
> >> It is said that key must point to DH_size(dh) bytes of memory. is 128
> bits
> >> the default length ? how can I adjust this length according the
> symetric-key
> >> algorithm I use ( AES128/ICM)
> >> Thanks for your help.
> >>
> >>
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > User Support Mailing List                    openssl-users@openssl.org
> > Automated List Manager                           majord...@openssl.org
> >
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to