From: “Rev. Mark Grant” <mark@unicorn.com>
To: cypherpunks@toad.com
Message Hash: 9047c0bd49ebb322af82801fab5cf6becdc439c8e09e14c2c7e43627cb4476ba
Message ID: <Pine.3.89.9510271616.A410-0100000@unicorn.com>
Reply To: N/A
UTC Datetime: 1995-10-27 17:41:34 UTC
Raw Date: Sat, 28 Oct 1995 01:41:34 +0800
From: "Rev. Mark Grant" <mark@unicorn.com>
Date: Sat, 28 Oct 1995 01:41:34 +0800
To: cypherpunks@toad.com
Subject: Diffie-Hellman Key Generation
Message-ID: <Pine.3.89.9510271616.A410-0100000@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain
Does anyone know of software available outside the US for generating
large (1024-bit or more) Diffie-Hellman keys ? The default key for CTCP
is only 512 bits, and I'd like to be able to give out some larger keys
(e.g. 1024 and 2048 bits) so that people have a choice of the level of
security that they want to use.
Alternatively, does anyone have any pre-generated large keys that I can
put in there ?
Finally, I'm basing this on comments in 'Applied Cryptography' that D-H
keys should be at least 512 bits and preferably 1024. How does the
difficulty of breaking a D-H exchange with a 512 bit key compare to
breaking a 512 bit RSA key ?
Mark
Return to October 1995
Return to ““Rev. Mark Grant” <mark@unicorn.com>”