My understanding is that 2048-bit DSA keys (with |q|=256) are currently 
supported - at least they seem to be in 1.0.1e and fips-2.0.2.  And "by 
supported" I mean that they can be 1) generated and 2) used with TLS provided 
the signature_algorithms extension is used so that SHA256 can be specified as 
the algorithm to use in digital signatures.

If you specify you want a key length of 2048-bits, the OpenSSL implementation 
gives you one with |q|=256| which meets FIPS 186-3.  (As a side note, even 
though FIPS 186-3 also allows 2048-bit with |q|=224, it doesn't look like you 
can actually get OpenSSL to produce such a key.  If I'm wrong on this point, 
someone please correct me.)






>________________________________
> From: Cipher <dhanukumar1...@gmail.com>
>To: openssl-users@openssl.org 
>Sent: Monday, June 3, 2013 2:12 AM
>Subject: RE: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys
> 
>
>Thanks for the quick reply.
>Since FIPS-140-3 may limit DSA key limit to be not less than 2048, Is there
>a chance of 2048 DSA key support in the near future upstream versions of
>openssl?
>
>
>Thanks.
>
>
>
>--
>View this message in context: 
>http://openssl.6102.n7.nabble.com/openssl-1-0-1e-bad-sig-size-32-32-for-DSA-2048-keys-tp45189p45402.html
>Sent from the OpenSSL - User mailing list archive at Nabble.com.
>______________________________________________________________________
>OpenSSL Project                                http://www.openssl.org
>User Support Mailing List                    openssl-users@openssl.org
>Automated List Manager                          majord...@openssl.org
>
>
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to