Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

REQUEST: Add (re-add?) RSA host key support #90

Open
VA1DER opened this issue Sep 6, 2024 · 1 comment
Open

REQUEST: Add (re-add?) RSA host key support #90

VA1DER opened this issue Sep 6, 2024 · 1 comment

Comments

@VA1DER
Copy link

VA1DER commented Sep 6, 2024

One of TinySSH's stated "features" is that it uses "no older cryptographic primitives - rsa, dsa, classic diffie-hellman, hmac-md5, hmac-sha1, 3des, arcfour, …"
While I would agree with almost all crypto in that list as being needing of removal, I am quite surprised by RSA being on that list.

I would like to see RSA host key support added to TinySSH.

All the best ciphers use a 256-bit session key. There is currently no way to protect this with a host key of equivalent strength. ed25519 is a great primitive, but far weaker than the session key it protects. There is a very basic rule that you never transmit keymat over a channel that is less secure than the security level of the keymat being transferred.

The only current host key primitive able to provide 256-bit grade host/client identity assurance is RSA.

@VA1DER
Copy link
Author

VA1DER commented Sep 15, 2024

I should also add, RSA is also the current champion for post-quantum host-key signatures in that a 256-bit grade RSA key (RSA 15360bit or better) would require only 32768 qubits, but something like 1-2 billion quantum gates. This is far beyond any reasonable expectation of existence in the near-to-medium future. We may see qubit counts in the 32k in the near-ish future, but nothing like that number of gates is on any sightable horizon.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant