[Cryptech Tech] Draft Requirements

Basil Dolmatov dol at reedcat.net
Sat Feb 21 07:29:20 UTC 2015


There is no slightest need to store keys inside the FPGA.
 Keys must be stored inside tamper boundary. It is not the same. 

dol@ с iPad

> 21 февр. 2015 г., в 5:11, Peter Gutmann <pgut001 at cs.auckland.ac.nz> написал(а):
> 
> Warren Kumari <warren at kumari.net> writes:
> 
>> Some nits:
> 
> Further nits: Missing use cases are email (PGP/SMIME), 1-2 private keys and
> many, many publics, and secure sessions (SSL/TLS/SSH), 1-2 private keys and
> numerous publics.
> 
> A more serious problem is the per-key storage requirements, which are, um,
> nowhere near reality.  For RSA you need storage for n, e, p, d, q, u, e1, and
> e2, and depending on how you implement it (whether you just expose a single
> "modexp" outside the FPGA or lower-level primitives that you have to compose
> yourself) for an n-bit key you need storage of 2n for most components, 4n for
> some, and about 45 temporaries.  For ECC algorithms you need qx, qy, d, p, a,
> b, gx, gy, n, and h, and so many dynamically-allocated temporaties 80, 100, or
> more) that I've never bothered trying to track them all.
> 
> For now I wouldn't even try and estimate this, just assume you need Some
> Memory and then wait until you've got the implementation sorted out to see
> what that is.
> 
> Peter.
> _______________________________________________
> Tech mailing list
> Tech at cryptech.is
> https://lists.cryptech.is/listinfo/tech


More information about the Tech mailing list