On Fri, Apr 21, 2000 at 01:58:39PM -0500, Scott G. Miller wrote:

<snip>

Ok! Ditch MD5.

>   A bigger key space is also a big deal.  It makes brute force attacks
> much more difficult.

Yes, SHA1 is worth it just because of this.

> > I would currently suggest DSA for public-key crypto because of patent 
> > issues.
> > It's slow than RSA. The RSA patent expires (in the US) on 20th Sep 2000. I
> > don't know about other countries. Then there are the eliptic-curve 
> > cryptosystems
> > but I think that they are too new to trust (but they are doing well).
> I agree here, assuming we use pubkey algorithms in the server.  More
> likely though, we will be using it only perhaps for key exchange of
> session keys.
> 

I was thinking of PVK's, but this as well.

AGL

-- 
Smoking is one of the leading causes of statistics.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 240 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20000421/89f2a52f/attachment.pgp>

Reply via email to