search for: cryptanalysts

Displaying 4 results from an estimated 4 matches for "cryptanalysts".

Did you mean: cryptanalysis
2017 Dec 31
2
Legacy option for key length?
...llmor <dkg at fifthhorseman.net > wrote: > On Thu 2017-12-28 21:31:28 -0800, Dan Mahoney (Gushi) wrote: > > > > Perhaps if you're dead-set on this being so dangerous, > > It's not the developers who are dead-set on weak-keyed RSA being > insecure, it's the cryptanalysts who have shown that to be the case :) > ?To further supplement this point, here is the paper that explain how RSA-768 was factorized. In 2010, the authors estimated that it would take around 1500 years to a single-core machine of this generation to ?do the same thing. We're 7 years after t...
2017 Dec 29
5
Legacy option for key length?
All, I occasionally manage some APC PDU devices. I manage them via a VPN, which enforces super-heavy crypto, and their access is restricted to only jumphosts and the VPN. Basically, the only time you need to log into these is when you go to reboot something that's down. Their web UI with SSL doesn't work with modern browsers. Their CPU is...tiny, and their SSHd implementation
2001 Jun 02
1
ssh-keygen(1) misinfo: English prose entropy 0.6 - 1.3 b/char!
Quoth manpage: otherwise easily guessable (English prose has only 1-2 bits of entropy per word, and provides very bad passphrases). The passphrase can be Whoever wrote that manpage is either possessed of some amazing human insight to which I am not privvy, chose a very non-representative sample of English prose, or is just plain wrong. I know none of you would ever make such a glaring error,
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms