[Mono-devel-list] Key Exchanges (RSA vs DH)
Sebastien Pouliot
sebastien.pouliot at gmail.com
Thu Jul 28 21:30:42 EDT 2005
Hello Thomas,
On Thu, 2005-28-07 at 03:50 -0400, Thomas Harning Jr. wrote:
> I'm trying to evaluate key exchange algorithms for both speed,
> security, and verification [S, S, V].
> I was thinking of using RSA mainly, but I ran accross some info
> about DiffieHellman being good for key exchange.
This may, or not, be relevant to your application but DH is for key
*agreement* not key exchange - so it's not exactly the same.
> I plan on using
> the key exchange algorithm in exchanging keys for say... Rijndael or
> some other configurable algorithm.
>
> I know a bit about RSA, but not much about DH. I know for RSA the
> key generation process is ugly (timewise),
very true (but for some good reasons ;-)
> but I can't remember how
> the encryption/decryption process is.
better. In fact *much* better when CRT can be used (i.e. when the
private is used and all the extra information are available).
> It seems DH is pretty fast, but I'm unsure as to how to configure it
> properly for my needs [ S,S,V ].
> In running a few tests, I found that the static key 'generation'
> works pretty good,
you would probably get very similar times for RSA encrypt/decrypt
operations when using a pre-generated key - i.e. this doesn't mean using
a static key!
> though to me, it looks pretty unsafe. Is it?
well it would be for a key exchange - but it's not for a key
agreement ;-) however YMMV with how you're using the stuff
> With Static key generation, I didn't need to do any passing of
> public key information (though it would obviously be the same w/
> static key)... which leads me to believe that it's relatively pointless.
>
> Also, there's 2 lengths to specify, but I don't know what really
> affects what. [As an aside, a patch to rename the length's names to
> something more meaningful would be nice... I may make a patch when I
> better understand how it works]
>
> Thanks for your help, sorry about the relativly messy train of thought.
I've more confidence in the maths behind the crypto (both for RSA and
DH) than in any software/hardware implementation of them - and MUCH more
confidence in the 'wares implementations than in (most) software using
them ;-)
So I suggest you get a good look at some crypto book like "Applied
Cryptography" or the more recent "Practical Cryptography" and/or stick
"as much as possible"(tm) with industry standards.
Sebastien
More information about the Mono-devel-list
mailing list