SRP verifier strength
Tom Wu
tom at arcot.com
Wed Apr 4 14:59:14 EST 2001
Tom,
Great work on filling in those tables. Have you investigated the impact
of using g=2 versus other values (like g being the same size as the
modulus)? Are the current numbers with g=2? Would there be any way to
test with different math library implementations?
Tom
Tom Holroyd wrote:
>
> On Tue, 3 Apr 2001, Tom Holroyd wrote:
>
> > Measurement of SRP verifier strength against an offline dictionary attack.
> >
> > +------+----------+------+
> > | bits | avg_wps | n |
> > +------+----------+------+
> > | 512 | 2123.036 | 40 |
> > | 640 | 1588.509 | 40 |
> > | 768 | 1381.072 | 80 |
> > | 1024 | 1015.222 | 80 |
> > | 1026 | 947.602 | 1680 |
> > | 1280 | 742.186 | 40 | md5crypt level
> > | 1536 | 576.117 | 40 |
> > | 2048 | 368.924 | 40 |
> > | 2049 | 357.929 | 1040 |
> > +------+----------+------+
>
> Another datapoint (measured the same way as before):
>
> +------+----------+------+
> | 4096 | 111.387 | 10 |
> +------+----------+------+
> ~90 blowfish level
>
> > For these rates, doubling the size of the prime increases the time to do
> > the dictionary search by an average factor of approximately 2.5.
>
> It's apparent that this isn't exactly a power law, but the regression line
> now stands at about 2.6 (closer to 3 for just the large primes), and SRP
> with a 4096 bit prime is getting close to the level of OpenBSD Blowfish
> hashes. It's not slow enough to be noticable on this machine, either,
> when used for authentication. You still shouldn't set your passphrase to
> "green" though. :-)
>
> Dr. Tom Holroyd
> chmod 000 /
--
Tom Wu
Principal Software Engineer
Arcot Systems
(408) 969-6124
"The Borg? Sounds Swedish..."
More information about the openssh-unix-dev
mailing list