We've actually had a discussion on this topic very recently.  My
understanding of what we've learned from that discussion (feel free to
chime in if I'm not understanding properly):

1) The NIST (a US organization) states that after December 31, 2010,
nobody should be using 1024-bit RSA keys to protect information.
http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf

2) There needs to be a mechanism to enforce this in NSS; the PKCS#11
validity period information provides a location to set such (since
PKCS#11 states that it is up to the application to set this equal to
the validity period of the underlying certificate or leave it unset).

3) Mozilla needs to change policy such that new 1024-bit root requests
are denied, since they won't be valid for more than a few months even
if they're approved.  (If it takes an average of 12 months to evaluate
a CA, then it'll be at least July 2009 before they're approved for
inclusion, and thus won't be able to be valid (given #1) for more than
17 months regardless.

-Kyle H

On Wed, Jun 11, 2008 at 1:31 AM, Jean-Marc Desperrier
<[EMAIL PROTECTED]> wrote:
> Kaspersky Lab announces the launch of Stop Gpcode, an international
> initiative against the blackmailer virus
> http://www.kaspersky.com/news?id=207575651
>
> If Kaspersky has made the analyze, and breaking a 1024 bit key is
> reasonnably within reach of a distributed effort, that means nobody
> should be using a 1024 key today for really important security.
>
> Gulp :-(
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to