Why does OpenSSL have a specific optimized function for generating DH primes if standard primes for DH use have already been supplied?
Name:
Anonymous2011-09-30 21:05
Probably because if you're just picking a number from a list, security is not more than the size of the list...
An attacker could just run through the list of primes..?
Name:
Anonymous2011-10-01 5:18
>>1
OpenSSL has had it from the start (1998) and before that it was in SSLeay from the start (1995). RFC 3526 was published in 2003.
Also you might want to generate bigger groups or be concerned the NSA backdoored RFC 3526 or whatever.
...There's only 6 numbers in that RFC ?? and it's using D-H like i thought...
...I must be wrong, that works out to like 3 bit of security...
...Wide-OPEN SSl?
Name:
Anonymous2011-10-01 22:07
NSA... are you kidding, any old joe could break that (i should stress>) IF i'm correct..
Lets see, it would be equivalent to about six 'normal' ? operations? (average case only 3?)
...unless your op's are so large that as few as six is too much work... (and these are only multiply/divide ops.) in which case it's probably unusable...
There must be (many) more in the list? (there would want to be..)
...Why even use a list at all?
Imagine you have 20 ultra-secure passwords of varying length...
This would be an example of high security...
Now, you go and post them on the internet, and 50% of people just pick one of the 20 given passwords...
This is NOT an example of high security, nor are the passwords even near strong, regardless of whatever random combination of characters, Uber-strong hash algorithms and whatever else might give you the illusion of security.