Practical cryptography - the key size problem: PGP after years
نویسندگان
چکیده
The size of cryptographic keys belongs to aspects that are quite easily dealt with in theory but that have to be carefully weighted in the practical cryptography. Particularly, current as well as predicted advances in technology must be taken into account as these dictate lower bounds for the key size to ensure reasonable security even with respect to specialized machines. On the other hand too large key size, while secure in theory, brings some implementation problems especially if speed and available storage are important or limited. The key size problem has also some relation to a purely practical problem, namely replacing a cryptosystem whose security level is no more satisfying. Particularly, if a cryptosystem still provides enough strength with respect to known analytical attacks, but advances in technology begin to make brute-force type of attacks possible, some steps need to be done to retain proper level of security. Quite obvious solution, i.e. to simply replace the old cryptosystem by another one is not always the best or even possible one as to devise a good cryptographic algorithm and especially to provide sufficient arguments on its security usually needs considerable time. But from the practical point of view even actual replacement of all installments of the old cryptosystem by new ones with minimal interruption of operations of related applications itself represents challenging problem especially in the case of cryptosystems that are of widespread use (e.g. are formal or defacto standards). Considerably better solution seems to be the one where cryptographic algorithm used offers necessary flexibility with respect to the key size, i.e. the essential architecture of the algorithm remains the same even if the size of its key may be increased.
منابع مشابه
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملA look at the PGP ecosystem through the key server data
PGP-based encryption systems use a network of key servers to share public keys. These key server operate on an add only basis, thus the data gives us access to PGP public keys from over 20 years of PGP usage. Analyzing this data allows searching for cryptographic weaknesses in large scale. I created a parser script that puts the raw cryptographic data of the PGP keys into a database. Doing this...
متن کاملThe PGP Trust Model
Pretty Good Privacy [3], or PGP, is a milestone in the history of cryptography, because for the first time it makes cryptography accessible to the wide mass of privacy hungry on-line public. PGP was created primarily for encrypting email messages using public or conventional key cryptography. The latter are used mainly to encrypt local files. With public key cryptography, PGP first generates a ...
متن کاملDesigning Identi cation Schemes with Keys ofShort Size ?
In the last few years, there have been several attempts to build identiication protocols that do not rely on arithmetical operations with large numbers but only use simple operations (see 10, 8]). One was presented at the CRYPTO 89 rump session ((8]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding pr...
متن کاملConfidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
Public-key authentication based on public-key certificates is a special case of the general problem of verifying a hypothesis (that a public key is authentic), given certain pieces of evidence. Beginning with PGP, several authors have pointed out that trust is often an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management, for dealing with this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001