On Wed, 23 Mar 2011 03:33, jpcli...@tx.rr.com said:
Could be in OpenPGP later this year. Camellia was fairly fast.
It is not required to be in in OpenPGP (technically a new RFC to extend
rfc4880). We have always added new features to OpenPGP before we had an
RFC for it. It is basically, that
On Tuesday 22 March 2011, Robert J. Hansen wrote:
On 3/22/11 5:50 PM, Jerome Baum wrote:
Actually none of this is that important. If you can do the
division in half a second instead of one, that only halves the
time you need. All I have to do is add one bit to my key size
and
Jerome Baum jerome at jeromebaum.com wrote on
Tue Mar 22 23:28:31 CET 2011 :
They go up with O(log(n)) where n is the number, or
something like it, right?
The Prime Number Theorem:
Pi(x) ~ x/ln(x)
(Pi(x) refers to the number of primes up to and including the
integer x
~ means
On Wednesday 23 March 2011, ved...@nym.hush.com wrote:
Jerome Baum jerome at jeromebaum.com wrote on
Tue Mar 22 23:28:31 CET 2011 :
They go up with O(log(n)) where n is the number, or
something like it, right?
The Prime Number Theorem:
Pi(x) ~ x/ln(x)
(Pi(x) refers to the
Ingo Klöcker kloecker at kde.org wrote on
Wed Mar 23 22:39:05 CET 2011 :
So, out of 2^2048 candidates you eliminate 1+2+...+300 = 300*301/2
=
45150 candidates which lie in those intervals. Impressive!
lol!
like I said,
4096 bit keys will remain secure for the not-too-near future
vedaal
Mike Acker mike_ac...@charter.net writes:
with chip makers playing with chips having 64 cores printed in silicon...
someplace i read the ratios on this,-- if you make the key a little
longer the key gets much harder to break. in public key encryption
though you have to factor the product of
with chip makers playing with chips having 64 cores printed in silicon...
someplace i read the ratios on this,-- if you make the key a little
longer the key gets much harder to break. in public key encryption
though you have to factor the product of the two large prime numbers --
which i'm told
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
On 22/03/2011 05:14 PM, Mike Acker wrote:
with chip makers playing with chips having 64 cores printed in silicon...
someplace
Jonathan Ely thaj...@gmail.com writes:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
Take that a few steps further. Why not use 999-bit
keys? Because
On 3/22/11 5:50 PM, Jerome Baum wrote:
Actually none of this is that important. If you can do the division in
half a second instead of one, that only halves the time you need. All I
have to do is add one bit to my key size and you're back to square
one.
You have to add one bit to
Robert J. Hansen r...@sixdemonbag.org writes:
You have to add one bit to your *effective* key size. Remember, the
primes are not evenly distributed: the larger you go, the more they are
spread out. This is why for very small keys each additional bit gives
you quite a lot of security, but as
On 3/22/2011 6:53 PM, Grant Olson wrote:
The actual cutting edge solution is to move from RSA to ECC. Even a
8192 bit or 16k bit RSA key isn't approved by the NSA or NIST for TOP
SECRET materials, but ECC-521 is.
Do you have a cite for that? I know ECC is approved, but I've never
been able
On 03/22/2011 06:06 PM, Jonathan Ely wrote:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
The actual cutting edge solution is to move from RSA to ECC. Even a
8192 bit or
What is ECC? Now I want that haha.
On 22/03/2011 06:53 PM, Grant Olson wrote:
On 03/22/2011 06:06 PM, Jonathan Ely wrote:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
Grant Olson k...@grant-olson.net writes:
On 03/22/2011 06:06 PM, Jonathan Ely wrote:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
The actual cutting edge solution is
On 3/22/2011 7:44 PM, Jerome Baum wrote:
Isn't ECDSA really vulnerable to reused and predictable signature
seeds (don't know what they're called, I'm talking about k)?
No moreso than many other algorithms. If the algorithm says this value
must be random and you don't use a random value, then
On 03/22/2011 07:29 PM, Robert J. Hansen wrote:
On 3/22/2011 6:53 PM, Grant Olson wrote:
The actual cutting edge solution is to move from RSA to ECC. Even a
8192 bit or 16k bit RSA key isn't approved by the NSA or NIST for TOP
SECRET materials, but ECC-521 is.
Do you have a cite for that?
On 03/22/2011 07:32 PM, Jonathan Ely wrote:
What is ECC? Now I want that haha.
Elliptic Curve Cryptography
https://secure.wikimedia.org/wikipedia/en/wiki/Elliptic_curve_cryptography
Since it isn't based on prime numbers, it 'scales' better than RSA or
DSA, and keys of similar security levels
On 03/22/2011 07:44 PM, Jerome Baum wrote:
Grant Olson k...@grant-olson.net writes:
ECC actually is up-and-running in the beta for gpg 2.1, but
realistically it'll be (at least) a few years before it gets mainstream
adoption.
You loose any interoperability as it's not OpenPGP, right? It
Grant Olson k...@grant-olson.net writes:
On 03/22/2011 07:44 PM, Jerome Baum wrote:
Grant Olson k...@grant-olson.net writes:
ECC actually is up-and-running in the beta for gpg 2.1, but
realistically it'll be (at least) a few years before it gets mainstream
adoption.
You loose any
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/22/2011 06:32 PM, Jonathan Ely wrote:
What is ECC? Now I want that haha.
Elliptic curve cryptography
http://en.wikipedia.org/wiki/Elliptic_curve_cryptography
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using
On Tue, Mar 22, 2011 at 5:14 PM, Mike Acker mike_ac...@charter.net wrote:
with chip makers playing with chips having 64 cores printed in silicon...
someplace i read the ratios on this,-- if you make the key a little
longer the key gets much harder to break. in public key encryption
though
Jerome Baum wrote:
Grant Olson k...@grant-olson.net writes:
On 03/22/2011 06:06 PM, Jonathan Ely wrote:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
The actual
hi,
I recently purchased this usb gnupg smart card
https://www.privacyfoundation.de/crypto_stick/
Within an email developers stated the usb stick itself could handle keys with
a length of 4096 but gnupg doesn't support these key lengths.
Is there any way of transferring my existing 4096 bit
On Wed, 2010-04-28 at 19:37 +0200, Joke de Buhr wrote:
Is there any way of transferring my existing 4096 bit keys to the card.
Generating new 3072 bit keys worked fine but it would be a lot better if I
could stick to my 4096 keys.
Obviously not...
Cheers,
Chris.
smime.p7s
Description: S
25 matches
Mail list logo