Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

Olafur Gudmundsson <ogud@ogud.com> Tue, 01 April 2014 12:39 UTC

Return-Path: <ogud@ogud.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 768191A06BD for <dnsop@ietfa.amsl.com>; Tue, 1 Apr 2014 05:39:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.8
X-Spam-Level:
X-Spam-Status: No, score=0.8 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XB_mrovRy56i for <dnsop@ietfa.amsl.com>; Tue, 1 Apr 2014 05:39:19 -0700 (PDT)
Received: from smtp109.ord1c.emailsrvr.com (smtp109.ord1c.emailsrvr.com [108.166.43.109]) by ietfa.amsl.com (Postfix) with ESMTP id 03C0A1A06AD for <dnsop@ietf.org>; Tue, 1 Apr 2014 05:39:18 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp6.relay.ord1c.emailsrvr.com (SMTP Server) with ESMTP id A4F0998970; Tue, 1 Apr 2014 08:39:14 -0400 (EDT)
X-Virus-Scanned: OK
Received: by smtp6.relay.ord1c.emailsrvr.com (Authenticated sender: ogud-AT-ogud.com) with ESMTPSA id CF4A699137; Tue, 1 Apr 2014 08:39:12 -0400 (EDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
From: Olafur Gudmundsson <ogud@ogud.com>
In-Reply-To: <B7893984-2FAD-472D-9A4E-766A5C212132@pch.net>
Date: Tue, 01 Apr 2014 08:39:11 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <102C13BE-E45E-437A-A592-FA373FF5C8F0@ogud.com>
References: <0EA28BE8-E872-46BA-85FD-7333A1E13172@icsi.berkeley.edu> <53345C77.8040603@uni-due.de> <B7893984-2FAD-472D-9A4E-766A5C212132@pch.net>
To: Bill Woodcock <woody@pch.net>
X-Mailer: Apple Mail (2.1510)
Archived-At: http://mailarchive.ietf.org/arch/msg/dnsop/WEl_kVWA-PmDm3ZyQdrVvdVAzJ4
Cc: dnsop@ietf.org, Matthäus Wander <matthaeus.wander@uni-due.de>
Subject: Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Apr 2014 12:39:20 -0000

On Mar 27, 2014, at 6:54 PM, Bill Woodcock <woody@pch.net> wrote:

> 
> On Mar 27, 2014, at 10:14 AM, Matthäus Wander <matthaeus.wander@uni-due.de> wrote:
>> Here's a small statistic about RSA key lengths of 741,552 signed
>> second-level domains (collected on 2014-01-27, counting KSK and ZSKs):
>> 
>> 1024 bit: 1298238
>> 2048 bit: 698232
>> 1280 bit: 28441
>> 4096 bit: 25326
>> 512 bit:   8893
>> 1536 bit: 385
> 
> Matthäus, do you have an easy way of separating out KSK from ZSK in your statistics?  FWIW, we’re currently doing 2048-bit KSK and 1024-bit ZSK, but will shortly be transitioning to 4096-and-2048.
> 
>                                -Bill
> 


Doing these big jumps is the wrong thing to do, increasing the key size increases three things:
	time to generate signatures  
	bits on the wire
	verification time. 

I care more about verification time than bits on the wire (as I think that is a red herring).
Signing time increase is a self inflicted wound so that is immaterial. 

                  sign    verify    sign/s verify/s
rsa 1024 bits 0.000256s 0.000016s   3902.8  62233.2
rsa 2048 bits 0.001722s 0.000053s    580.7  18852.8
rsa 4096 bits 0.012506s 0.000199s     80.0   5016.8

Thus doubling the key size decreases the verification performance by roughly by about 70%. 

KSK's verification times affect the time to traverse the DNS tree, thus 
If 1024 is too short 1280 is fine for now
If 2048 is too short 2400 bit key is much harder to break thus it should be fine. 

just a plea for key use policy sanity not picking on Bill in any way.

	Olafur