Bitcoin Forum
April 25, 2024, 11:39:53 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: multiple forms of asymmetric crypto for key generation  (Read 643 times)
nowise (OP)
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
May 12, 2014, 02:10:56 AM
 #1

Quote
More likely is that the NSA has some mathematical breakthrough that affects one or more public-key algorithms. There are a lot of mathematical tricks involved in public-key cryptanalysis, and absolutely no theory that provides any limits on how powerful those tricks can be.

Breakthroughs in factoring have occurred regularly over the past several decades, allowing us to break ever-larger public keys. Much of the public-key cryptography we use today involves elliptic curves, something that is even more ripe for mathematical breakthroughs. It is not unreasonable to assume that the NSA has some techniques in this area that we in the academic world do not. Certainly the fact that the NSA is pushing elliptic-curve cryptography is some indication that it can break them more easily.

If we think that's the case, the fix is easy: increase the key lengths.

Assuming the hypothetical NSA breakthroughs don't totally break public-cryptography -- and that's a very reasonable assumption -- it's pretty easy to stay a few steps ahead of the NSA by using ever-longer keys. We're already trying to phase out 1024-bit RSA keys in favor of 2048-bit keys. Perhaps we need to jump even further ahead and consider 3072-bit keys. And maybe we should be even more paranoid about elliptic curves and use key lengths above 500 bits.[1]

I was thinking about this while rolling 16 sided hex dice to generate some 256-bit randomness and wondered if my dice were loaded.

What if their is a "breakthrough" in hacking elliptical-curve cryptography?  I don't mean to sound dire or drab, and I haven't spent enough time on this sub-forum to know if this has been rehashed a million times (if so sage this to hell).  I did search a little and couldn't find anything on multiple forms of key generation/use, which leads me to my question.

Is there a need for another form of asymmetric crypto that should be implemented into the base code for use as an alternative or backup in the future?

Is there a need for an extended key length beyond 256?  Maybe people using keys larger then 256 pay a little more in fees for their added content size.

Just some questions seeking some intelligent answers.  Thanks for your time.


[1] - https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html
1714045193
Hero Member
*
Offline Offline

Posts: 1714045193

View Profile Personal Message (Offline)

Ignore
1714045193
Reply with quote  #2

1714045193
Report to moderator
Activity + Trust + Earned Merit == The Most Recognized Users on Bitcointalk
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714045193
Hero Member
*
Offline Offline

Posts: 1714045193

View Profile Personal Message (Offline)

Ignore
1714045193
Reply with quote  #2

1714045193
Report to moderator
1714045193
Hero Member
*
Offline Offline

Posts: 1714045193

View Profile Personal Message (Offline)

Ignore
1714045193
Reply with quote  #2

1714045193
Report to moderator
1714045193
Hero Member
*
Offline Offline

Posts: 1714045193

View Profile Personal Message (Offline)

Ignore
1714045193
Reply with quote  #2

1714045193
Report to moderator
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1004


Core dev leaves me neg feedback #abuse #political


View Profile
May 12, 2014, 02:14:09 AM
 #2

This is another one of those topics that seems to get brought up all the time.

Here's a recent thread:

https://bitcointalk.org/index.php?topic=598903.0

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!