On 25/06/18 11:17, Dimitry Sibiryakov wrote:
25.06.2018 11:29, Tony Whyman wrote:
Even if it were still computationally infeasible to break Srp today,
it is probably that in the next few years it will be totally broken.
You missed my words "non-theoretical".
There is nothing theoretical about brute force attacks. They always
work, the only issue how long they take.
Security is an "arms race" and you to keep upping your game as you know
that the attackers are only just behind you. Its a similar story with
RSA key lengths. Once 1024 bits was impregnable. Now at least 2048 is
recommended - some would say 4096 bits is what you need.
In all cases, the trick is to keep an eye on how quickly brute force
attacks are developing and to upgrade not when the attack becomes a
"non-theoretical" attack - but before.
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel