Score:1

Wrapping "stronger" keys with "weaker" ones?

ng flag

I am looking at wrapping AES keys with RSA. In NIST SP 800-57 Part 1 Recommendation for Key Management, pg 55 it is estimated that the RSA security-strength equivalent of symmetric AES-256 key would be a RSA key with 15360 bits modulus. This RSA key size looks impractical, and mostly not even available due to technical reasons.

Is there a practical and proven mechanism for wrapping "stronger" symmetric keys with a set of "weaker" RSA wrapping keys?

kelalaka avatar
in flag
What are your risks? What are your constraints? What is your target security? What are the capabilities of your adversary? What is the required date so that the data need to be still safe?
Lajos Pajtek avatar
ng flag
The requirement is "security strength equivalence" as indicated in NIST SP 800-57, specifically applied to key wrapping. The technical limitation is that only RSA keys up to 4k are available, which in this frame are not strong enough when it comes to wrapping AES-256 keys.
Score:0
in flag

Is there a practical and proven mechanism for wrapping "stronger" symmetric keys with a set of "weaker" RSA wrapping keys?

The problem is not due to any technical issue. It is just that the key strength would be undermined if the ciphertext was available to an attacker (and usually that's a common assumption, as otherwise you would not have to wrap anything in the first place). The mechanism is fine, but the security of the key is now less than 256 bits.

So what are your options around this issue:

  • use a different method for key establishment, such as ECDH (agreement) or ECIES (wrapping / encapsulation);
  • mitigate the problem by protecting the ciphertext using other measures;
  • downgrade to AES-128 - hey is it pretty secure anyway.

Finally, maybe you are just using 256 bit AES because it is a technical requirement. If you only need 128 bits of security in the first place then using a 4Kib RSA key pair is fine.

Note that ECDH and ECIES and are more vulnerable to quantum analysis than RSA, so you may also want to look into post quantum computing if you need to keep the data confidential in the not so near future. AES-128 is also somewhat vulnerable.

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.