Displaying 4 results from an estimated 4 matches for "cryptanalyst".
Did you mean:
cryptanalysts
2017 Dec 31
2
Legacy option for key length?
...llmor <dkg at fifthhorseman.net
> wrote:
> On Thu 2017-12-28 21:31:28 -0800, Dan Mahoney (Gushi) wrote:
>
>
> > Perhaps if you're dead-set on this being so dangerous,
>
> It's not the developers who are dead-set on weak-keyed RSA being
> insecure, it's the cryptanalysts who have shown that to be the case :)
>
?To further supplement this point, here is the paper that explain how
RSA-768 was factorized. In 2010, the authors estimated that it would take
around 1500 years to a single-core machine of this generation to ?do the
same thing. We're 7 years after...
2017 Dec 29
5
Legacy option for key length?
All,
I occasionally manage some APC PDU devices. I manage them via a VPN,
which enforces super-heavy crypto, and their access is restricted to only
jumphosts and the VPN. Basically, the only time you need to log into
these is when you go to reboot something that's down.
Their web UI with SSL doesn't work with modern browsers.
Their CPU is...tiny, and their SSHd implementation
2001 Jun 02
1
ssh-keygen(1) misinfo: English prose entropy 0.6 - 1.3 b/char!
Quoth manpage:
otherwise easily guessable (English prose has only 1-2 bits of entropy
per word, and provides very bad passphrases). The passphrase can be
Whoever wrote that manpage is either possessed of some
amazing human insight to which I am not privvy, chose a very
non-representative sample of English prose, or is just plain
wrong. I know none of you would ever make such a glaring
error,
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most
relevant information is near the top, but it''s all quite good... :-)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
There is no intrinsic difference between algorithm and data, the
same information can be viewed as data in one context and as
algorithm in another. Why then do so many people claim that
encryption algorithms