1995-10-27 - Diffie-Hellman Key Generation

Header Data

From: “Rev. Mark Grant” <mark@unicorn.com>
To: cypherpunks@toad.com
Message Hash: 9047c0bd49ebb322af82801fab5cf6becdc439c8e09e14c2c7e43627cb4476ba
Message ID: <Pine.3.89.9510271616.A410-0100000@unicorn.com>
Reply To: N/A
UTC Datetime: 1995-10-27 17:41:34 UTC
Raw Date: Sat, 28 Oct 1995 01:41:34 +0800

Raw message

From: "Rev. Mark Grant" <mark@unicorn.com>
Date: Sat, 28 Oct 1995 01:41:34 +0800
To: cypherpunks@toad.com
Subject: Diffie-Hellman Key Generation
Message-ID: <Pine.3.89.9510271616.A410-0100000@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know of software available outside the US for generating 
large (1024-bit or more) Diffie-Hellman keys ? The default key for CTCP 
is only 512 bits, and I'd like to be able to give out some larger keys 
(e.g. 1024 and 2048 bits) so that people have a choice of the level of 
security that they want to use.

Alternatively, does anyone have any pre-generated large keys that I can 
put in there ?

Finally, I'm basing this on comments in 'Applied Cryptography' that D-H
keys should be at least 512 bits and preferably 1024. How does the
difficulty of breaking a D-H exchange with a 512 bit key compare to
breaking a 512 bit RSA key ? 

	Mark






Thread