Thoughts on 15 day CJ crypto

Hal hfinney at shell.portal.com
Sat Dec 17 12:58:30 PST 1994


-----BEGIN PGP SIGNED MESSAGE-----

eric at remailer.net (Eric Hughes) writes:

>   From: Hal <hfinney at shell.portal.com>

>   Also, are there restrictions on the encryption exponent?  A 1024 bit RSA
>   with a small encryption exponent would be faster to check than a 512 bit
>   RSA with an arbitrary 512 bit encryption exponent.  

>These are public key operations, remember.  The public exponents are
>usually only a few bits long anyway, no matter what the modulus.  

That's what I mean.  "Usually" they are, but that helps a snooper to
check his guess.  Maybe it would be wise when using limited-length
session keys to use larger encryption exponents just to confound an
exhaustive search of the session key space.  I think it is surprising
if there is no limitation on encryption exponent size for these
exportable key systems, assuming that is the strategy the government is
using.

Hal

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQBVAwUBLvNQxRnMLJtOy9MBAQHXdAIAmvtcjZUXJF97vROjOFQK1DJ2jx44GhZq
CkmETSb8nmkzJhRVDYyQ7aZgWKSOril2MQsTRkJ59DyLKGZY7qQ6oQ==
=e06A
-----END PGP SIGNATURE-----






More information about the cypherpunks-legacy mailing list