DSS Standard

Pete Chown Pete.Chown@skygate.co.uk
Thu, 24 Aug 2000 11:43:40 +0100


Stefan Nobis wrote:


> But what about encrypting the whole text and not signing it? There you
> use a conventional symetric cipher to encrypt the text and the
> symetric key is crypted with the public key of the receiver. In this
> szenario the secret key need not to be stronger than the conventional
> cipher.
This is true, but DSS will not be used in this situation. There is a variant of ElGamal encryption that works with DSA style keys, but it is not in wide use and OpenPGP does not use it.
> Do i understand things right when i assume there are two secret keys,
> one for signing and one for encryption and that the first is not
> longer than 160 bits but the later may be 1024 bit or more?
No. DSA uses two parameters, one 160 bits and one which is 512 to 1024 bits. These parameters can be shared among as many users of DSA as you want without weakening security. Then, of course, a user has a public and a private key as with simpler systems such as RSA. So each user will have his or her own public and private key. Then there will be two parameters which might or might not be the same as the ones used by other people's keys. You can attack DSA by solving one of two discrete logarithm problems. One is in a group of order 160 bits and the other is in a group of order 512 to 1024 bits depending on the length of the other parameter. However, some types of discrete log are easier than others; it is believed that the two problems are about equivalent when the variable length parameter is 1024 bits. There is therefore no point in making the variable length parameter longer than 1024 bits unless you make the other one longer as well. AFAIK there is no reason not to do this, but because SHA-1 is 160 bits it doesn't make any sense in the context of the DSS (which specifies SHA-1 as the hash function). -- Pete -- Archive is at http://lists.gnupg.org - Unsubscribe by sending mail with a subject of "unsubscribe" to gnupg-users-request@gnupg.org