Interesting study of public keys: http://eprint.iacr.org/2012/064.pdf
NY Times article: http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an -online-encryption-method.html?_r=1 By the way, if anyone feels this sort of topic is inappropriate for this list, then please let me know. Cheers, Paul ________________________________________________________________________ _____________________________ Paul A. Suhler, PhD | Firmware Engineer | Quantum Corporation | Office: 949.856.7748 | paul.suh...@quantum.com <mailto:paul.suh...@quantum.com> Preserving the World's Most Important Data. Yours.(tm) ---------------------------------------------------------------------- The information contained in this transmission may be confidential. Any disclosure, copying, or further distribution of confidential information is not permitted unless such privilege is explicitly granted in writing by Quantum. Quantum reserves the right to have electronic communications, including email and attachments, sent across its networks filtered through anti virus and spam software programs and retain such messages in order to comply with applicable data security and retention requirements. Quantum is not responsible for the proper and complete transmission of the substance of this communication or for any delay in its receipt.