CE39 - Sécurité Globale, Cybersécurité 2021

Key Length Estimates: Practical and Theoretical Optimizations and Modern Approaches on NFS Instances for Accurate Costs – KLEPTOMANIAC

Submission summary

The RSA cryptosystem and the Diffie-Hellman key exchange protocol in finite fields were the first invented primitives of public-key cryptography. It is hard to estimate the time and resources that are needed to factor an integer, and thereby how hard it is to break RSA. All regulatory bodies recommend that people either avoid RSA, or prefer large RSA key sizes for safety, above 2048 bits at least. In environments where computing power is plentiful, this recommendation is most often followed. Yet, it is a fact that we do rely on cryptography that uses smaller key sizes. We plan to employ our expertise to provide solid hardness assessments for key sizes that are relevant today, and for which accuracy in the prediction is important. Our targets for accurate assessment are RSA-1024 and DH-1024 as well as specific discrete logarithm-related problems that arise in the blockchain context. We also intend to develop simulation software that would enable more accurate estimates.

Project coordination

Emmanuel Thomé (Centre de Recherche Inria Nancy - Grand Est)

The author of this summary is the project coordinator, who is responsible for the content of this summary. The ANR declines any responsibility as for its contents.

Partnership

Inria Nancy Grand Est Centre de Recherche Inria Nancy - Grand Est
ANSSI ANSSI (Agence nationale de la sécurité des systèmes d'information) / Sous-direction Expertise / Direction Scientifique et Technique (SDE/DST)
LIP6 LIP6

Help of the ANR 427,148 euros
Beginning and duration of the scientific project: - 48 Months

Useful links

Explorez notre base de projets financés

 

 

ANR makes available its datasets on funded projects, click here to find more.

Sign up for the latest news:
Subscribe to our newsletter