Link to home
Start Free TrialLog in
Avatar of nav_support
nav_supportFlag for Canada

asked on

Setting DRA's Key Length to 4096

Hello,

I'm deploying a Microsoft PKI solution and need to create a DRA for EFS.  By default, using the cipher \r command, it creates a DRA key of 2048 bits on either a Vista or a 2008 machine (1024 on 2003 and XP).  However, I would like create them as 4096 bit in length.  I have added theHKLM\Software\Microsoft\Windows NT\CurrentVersion\EFS\RSAKeyLength DWORD with a decimal value of 4096 as recommended by Microsoft document.  Unfortunately, when I run the cipher \r command to create a DRA key, it is created as a 2048 bit length RSA key.   I have no idea how to get around this problem.

Any help would be appreciated.

Cheers,
Mark
Avatar of Paranormastic
Paranormastic
Flag of United States of America image

Dare I ask why you would want a 4096 keyset?  2048 is plenty good enough to last you for over a decade.

Are you trying to create this on a smartcard or just as a local file?  The CSP needs to support the 4096 keyset, which most, if not all, smartcards do not.  4096 can be created on another device and stored on a smartcard, that's a different story, such as with an HSM, but that would not suite your purpose.  The default MS CSPs should support 4096 ok though.

Also, is this using a self-signed cert or one from a CA?
If this is a CA issued cert, you should try adding that same reg key to the CA server as well.
likewise, a CA cannot issue a cert with a key strength greater than its own.  I.e. the CA cert needs to be 4096 or higher to issue a 4096 key.  The reasoning behind this is that the CA cert would be made vulnerable prior to the cert it is authorizing.
Also keeping in mind that the validity period cannot be longer than that of the CA cert - if it is set longer it will be truncated.
Avatar of nav_support

ASKER

Thanks for your comments Paranormastic.

I should have mentioned in my question, this will be a self-signed certificate as opposed to a CA issued one.  Essentially, it is so we don't have to worry about renewing it at any point.  

I'm essentially trying to create the self-signed certificate locally, so there are no smartcards in the equation (perhaps in the future, but not anytime soon).

As for why we would a 4096 key length, it is probably just paranoia (most likely misplaced!) since the key will be in use for a long while.  I suppose if I can't get around this issue, I'll end up using a 2048 key length.

Cheers,
Mark
ASKER CERTIFIED SOLUTION
Avatar of Paranormastic
Paranormastic
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thanks again Paranormastic for your response.  I just tested creating a self signed EFS key on a Vista box and the key was created using a 4096 key length using that Registry entry.  However, when I create a DRA key it is only a 2048.  So your suspicion about the registry entry only working on the EFS keys and not the DRA are correct.  I guess I'll have to settle for a 2048 key length for the DRA unless I use a CA issued one.

Also, thanks for the handy reg key - I had read about this option, but I had not seen the actual registry entry.  Much appreciated.
Paranormastic made me think about what I was doing by seing what would happen when I changed the registry value and created a self-signed EFS cert and a DRA (the EFS cert was affected by the registry key and not the DRA).  This convinced me that what I was trying to do won't work.