On Fri, Apr 21, 2000 at 01:58:39PM -0500, Scott G. Miller wrote: <snip>
Ok! Ditch MD5. > A bigger key space is also a big deal. It makes brute force attacks > much more difficult. Yes, SHA1 is worth it just because of this. > > I would currently suggest DSA for public-key crypto because of patent > > issues. > > It's slow than RSA. The RSA patent expires (in the US) on 20th Sep 2000. I > > don't know about other countries. Then there are the eliptic-curve > > cryptosystems > > but I think that they are too new to trust (but they are doing well). > I agree here, assuming we use pubkey algorithms in the server. More > likely though, we will be using it only perhaps for key exchange of > session keys. > I was thinking of PVK's, but this as well. AGL -- Smoking is one of the leading causes of statistics. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20000421/89f2a52f/attachment.pgp>
