### Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH?

Dan Brown <danibrown@blackberry.com> Thu, 06 April 2017 14:26 UTC

Return-Path: <danibrown@blackberry.com>

X-Original-To: cfrg@ietfa.amsl.com

Delivered-To: cfrg@ietfa.amsl.com

Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D873A129526 for <cfrg@ietfa.amsl.com>; Thu, 6 Apr 2017 07:26:43 -0700 (PDT)

X-Virus-Scanned: amavisd-new at amsl.com

X-Spam-Flag: NO

X-Spam-Score: -1.607

X-Spam-Level:

X-Spam-Status: No, score=-1.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, PLING_QUERY=0.994, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no

Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s0pZdg0ofVd1 for <cfrg@ietfa.amsl.com>; Thu, 6 Apr 2017 07:26:41 -0700 (PDT)

Received: from smtp-p02.blackberry.com (smtp-p02.blackberry.com [208.65.78.89]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92985129512 for <cfrg@irtf.org>; Thu, 6 Apr 2017 07:26:31 -0700 (PDT)

Received: from xct102cnc.rim.net ([10.65.161.202]) by mhs214cnc.rim.net with ESMTP/TLS/DHE-RSA-AES256-SHA; 06 Apr 2017 10:26:31 -0400

Received: from XCT116CNC.rim.net (10.65.161.216) by XCT102CNC.rim.net (10.65.161.202) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 6 Apr 2017 10:26:30 -0400

Received: from XMB116CNC.rim.net ([fe80::45d:f4fe:6277:5d1b]) by XCT116CNC.rim.net ([::1]) with mapi id 14.03.0319.002; Thu, 6 Apr 2017 10:26:29 -0400

From: Dan Brown <danibrown@blackberry.com>

To: "Anna (Amy) Johnston" <jannaston@gmail.com>

CC: "cfrg@irtf.org" <cfrg@irtf.org>

Thread-Topic: [Cfrg] Prime 630*(427!+1)+1 for classic DH?

Thread-Index: AdKuRDlyn/lIDT1CSziTnc33dxF2iAAKQnOAAAXeLwAABKmVAAAAthgAAAOX2YAADNTDcA==

Date: Thu, 06 Apr 2017 14:26:28 +0000

Message-ID: <810C31990B57ED40B2062BA10D43FBF501B0AC3A@XMB116CNC.rim.net>

References: <810C31990B57ED40B2062BA10D43FBF501B0A7E2@XMB116CNC.rim.net> <B237EB39-C25F-48D7-9B51-81653A380F5F@seer-grog.net> <88898D32-CFF0-4043-BA88-9849031069E2@seer-grog.net> <7626A54F-BE87-4E68-B0F9-54CD878B4A87@juniper.net> <91D64FF1-D997-42FB-90CE-3B1422584974@juniper.net> <C5082BB6-EE29-4E64-A1FA-80E6BE482C60@gmail.com>

In-Reply-To: <C5082BB6-EE29-4E64-A1FA-80E6BE482C60@gmail.com>

Accept-Language: en-US, en-CA

Content-Language: en-US

X-MS-Has-Attach:

X-MS-TNEF-Correlator:

x-originating-ip: [10.65.160.245]

Content-Type: text/plain; charset="us-ascii"

Content-Transfer-Encoding: quoted-printable

MIME-Version: 1.0

Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/fZcQ0uClrMMApniGvt7SpmRdNRo>

Subject: Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH?

X-BeenThere: cfrg@irtf.org

X-Mailman-Version: 2.1.22

Precedence: list

List-Id: Crypto Forum Research Group <cfrg.irtf.org>

List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>

List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>

List-Post: <mailto:cfrg@irtf.org>

List-Help: <mailto:cfrg-request@irtf.org?subject=help>

List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>

X-List-Received-Date: Thu, 06 Apr 2017 14:26:44 -0000

Good points! Responses inline below (between <<< >>> sorry if that's awkward.) -----Original Message----- From: Cfrg [mailto:cfrg-bounces@irtf.org] On Behalf Of Anna (Amy) Johnston With a prime like this (and with the knowledge that q is prime), a better way (non-probabilistic) is to use Pocklington's theorem. Two exponentiations with the right base and you've proved primality. q can also be checked for primality with Pocklington's, but it takes a larger number of much smaller exponentiations. <<< Sounds right. Primality proofs are good checks before deployment. I felt they were not needed to tentatively discuss the merits. >>> The SNFS reduces the computation cost of the sieve, but as larger base fields become the norm (at least 2048 bits), the linear algebra, not the sieve will be the problem (see iacr e-print 2017/067, page 8, as well as other discrete logarithm records in the past -- all shift work away from the linear algebra to the sieve). This means that back doors are not as big a concern. <<< I was extrapolating (too much?) from Fried et al. ia.cr/2016/961, especially this from the Section 6.3 Lessons: "Both from this perspective, and from our more modern one, dismissing the risk of trapdoored primes in real usage appears to have been a mistake, as the apparent difficulties encountered by the trapdoor designer in 1992 turn out to be easily circumvented." My extrapolation is that for even for very large keysizes, let's not dismiss the possibility of a trapdoor, so let's use some kind of additional countermeasure. I'm not alone in this, since other fixed DH prime in IETF RFCs are derived from pi, etc. I agree that it may, in the end, be overly cautious, but it seems to have little cost. >>> If sieving attacks are the main concern, then regularly changing the primes used would be a bigger boost to security. Fixed primes, uses everywhere, mean that the huge cost of the sieve and solving the system of equations have an even bigger payoff. Changing primes regularly minimizes an attackers gain from any possible sieve attack -- SNFS, more general, or other index calculus attacks which may be developed. <<< Yes, you're essentially right about variable primes. I totally forgot to compare to them. Prime 630*(427!+1)+1 should only be compared to other fixed DH primes. At the moment, I don't remember the usual tradeoffs between fixed and variable classic DH primes ..., but I recall that some like fixed DH primes. Hmm, I think variable DH primes compare less favorably to 630*(427!+1)+1 on the issue of the den Boer reduction. I rather like the original den Boer reduction between DHP and DLP, and nearly optimizing it forces one to a special prime, which might as well (???) be fixed. I do realize that there are reasonable alternatives to den Boer. Most simply, just assume that DHP hard. Use a Maurer-Wolf reduction, or rely on Boneh-Lipton's results about the conjectural existence of such reductions. I just see the den Boer reduction as simpler, but maybe that's being too sentimental. Side joke: for those that really like to see vitanums pi and e in their primes (not to mention sqrt(2)), look up Stirling's formula to find them in 630*(427!+1)+1. >>>

- [Cfrg] Prime 630*(427!+1)+1 for classic DH? Dan Brown
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Greg Rose
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Greg Rose
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Greg Rose
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Travis Finkenauer
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Travis Finkenauer
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Anna (Amy) Johnston
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Dan Brown
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Anna (Amy) Johnston
- Re: [Cfrg] Prime 630*(427!+1)+1 for classic DH? Watson Ladd