[openssl-users] X25519 - why openssl shows server temp key as 253 bits?
aerowolf at gmail.com
Tue Sep 4 12:00:29 UTC 2018
Probably because the definition of X25519 requires that bits 0, 1, and 2 of
the first byte of the private key are set to 0 before being used, and
OpenSSL counts the number of bits including the highest-order set bit.
(Really, there's an additional 2 bits that are also set to known values:
bit 6 of the last byte is set, and bit 7 of the last byte is cleared. In
my view, this actually reduces the necessary brute-force search space from
256 bits to 251 bits. However, literally any 32-byte string can be used as
a public key. Apparently, djb views this as sufficient to call it a
256-bit strength function.)
For the specification, please see the subsection entitled "Responsibilities
of the User" in section 3 of https://cr.yp.to/ecdh/curve25519-20060209.pdf .
On Mon, Sep 3, 2018, 22:29 M K Saravanan <mksarav at gmail.com> wrote:
> When using openssl with X25519, why it shows the server temp key as 253
> No client certificate CA names sent
> Peer signing digest: SHA256
> Peer signature type: RSA
> Server Temp Key: X25519, 253 bits
> I thought Curve25519 is using 256 bit keys.
> Why 253 instead of 256?
> with regards,
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the openssl-users