1997-06-10 - Re: PGP Key generation

Header Data

From: Paul Bradley <paul@fatmans.demon.co.uk>
To: “Mark M.” <markm@voicenet.com>
Message Hash: 5ad769bba626bcdcb0651d197f19433d7a6cb81afdf1f651deb46bad29c74047
Message ID: <Pine.LNX.3.91.970609194807.2934A-100000@fatmans.demon.co.uk>
Reply To: <Pine.LNX.3.96.970608211659.3887A-100000@purple.voicenet.com>
UTC Datetime: 1997-06-10 00:09:40 UTC
Raw Date: Tue, 10 Jun 1997 08:09:40 +0800

Raw message

From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Tue, 10 Jun 1997 08:09:40 +0800
To: "Mark M." <markm@voicenet.com>
Subject: Re: PGP Key generation
In-Reply-To: <Pine.LNX.3.96.970608211659.3887A-100000@purple.voicenet.com>
Message-ID: <Pine.LNX.3.91.970609194807.2934A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> There are a few shortcuts you could take.  For instance, instead of finding
> two random, prime numbers for every key, just keep one prime constant and
> generate another random prime for each key.  This has the disadvantage
> that any one key factored would allow the other keys to be factored
> trivially.  I know there are other ways, but I'm not very good with number
> theory.

This would actually not save as much time as it trivially appears to, the 
main time eater in pgp key generation is a. getting random seeds and 
mixing to distill randomness, and b. executing the extended euclidean 
algorithm to find modular inverses. 

Does anyone know any other speedups? - I`m sure I could think of a few 
but I`m really not in the mood ;-)...

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







Thread