[Bug 1002434]
Wan-Teh Chang
wtc at google.com
Thu Jun 7 04:01:49 UTC 2012
bsmith: the Diffie-Hellman private keys generated by NSS
are hardcoded to be 160 bits long:
http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/freebl/dh.c&rev=1.11&mark=24#24
The private key length should be the same as the length of the
q parameter. So for a 2048-bit p, q should be either 224 or
256 bits. A 160-bit q is only appropriate for a 1024-bit p.
Private key length should max out at 512 bits (at the 256-bit
security level).
We can come up with a step function that returns these discrete
private key lengths depending on the size of p:
160 bits
224 bits
256 bits
384 bits
512 bits
See NIST SP 800-57, Table 2 and http://www.keylength.com/en/4/
--
You received this bug notification because you are a member of Mozilla
Bugs, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1002434
Title:
TLS interoperability issue in NSS based software
To manage notifications about this bug go to:
https://bugs.launchpad.net/nss/+bug/1002434/+subscriptions
More information about the Ubuntu-mozillateam-bugs
mailing list