[Ach] Applied Crypto Hardening
L. Aaron Kaplan
kaplan at cert.at
Thu Dec 12 00:24:26 CET 2013
On Dec 11, 2013, at 11:45 PM, "Philipp Gühring" <pg at futureware.at> wrote:
> Hi,
>
>>> - In chap. 6 you mentioned: "The security of the RSA and
>> Diffie-Hellman algorithms is based on the assumption that factoring
>>> large primes is infeasable.
>
> This is wrong, Diffie-Hellman does not depend on the factoring of large
> primes, it depends on discrete logarithm.
Well, complexity wise you can transform these problems.
Have a look: http://www.mccurley.org/papers/dlog.pdf
or (simpler): http://crypto.stackexchange.com/questions/9385/reduction-of-integer-factorization-to-discrete-logarithm-problem
==> effect: both sentences were correct (if viewed through the angle of complexity theory)
In this sense, I feel like perfectly fine with the original sentence as well :)
>
> But attacker-wise both problems are very similar, so if you break one of
> them, you are likely able to break the other too.
>
> Best regards,
> Philipp
>
> _______________________________________________
> Ach mailing list
> Ach at lists.cert.at
> http://lists.cert.at/cgi-bin/mailman/listinfo/ach
---
// L. Aaron Kaplan <kaplan at cert.at> - T: +43 1 5056416 78
// CERT Austria - http://www.cert.at/
// Eine Initiative der nic.at GmbH - http://www.nic.at/
// Firmenbuchnummer 172568b, LG Salzburg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 163 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.cert.at/pipermail/ach/attachments/20131212/e0431f39/attachment.sig>
More information about the Ach
mailing list