On Sun, 24 Jun 2012 17:23:47 -0400
Robert Simmons wrote:

> On Sun, Jun 24, 2012 at 5:18 PM, Dag-Erling Smørgrav <[email protected]>
> wrote:
> > Robert Simmons <[email protected]> writes:
> >> In light of advanced in processors and GPUs, what is the potential
> >> for duplication of RSA, DSA, and ECDSA keys at the current default
> >> key lengths (2048, 1024, and 256 respectively)?
> >
> > You do know that these keys are used only for authentication, and
> > not for encryption, right?
> 
> Yes, the encryption key length is determined by which symmetric cipher
> is negotiated between the client and server based on what is available
> from the Ciphers line in sshd_config and ssh_config.

I'm not very familiar with ssh, but surely they're also used for
session-key exchange, which makes them crucial to encryption. They
should be as secure as the strongest symmetric cipher they need to work
with.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[email protected]"

Reply via email to