believe you can do this without using some form of public key
system.
-Jeff
–
___
Jeffrey I. Schiller
Information Services and Technology
Massachusetts Institute of Technology
77 Massachusetts Avenue Room E17
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, Sep 06, 2013 at 05:22:26PM -0700, John Gilmore wrote:
Speaking as someone who followed the IPSEC IETF standards committee
pretty closely, while leading a group that tried to implement it and
make so usable that it would be used by default
entropy to use
it for encryption or for signatures.
- -Jeff
___
Jeffrey I. Schiller
Information Services and Technology
Massachusetts Institute of Technology
77 Massachusetts Avenue Room E17-110A, 32-392
Cambridge, MA 02139-4307
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
While we worry about symmetric vs. public key ciphers, we should not
forget the risk of compromise of our long-term keys. How are they
protected?
One of the most obvious ways to compromise a cryptographic system is
to get the keys. This is a
___
Jeffrey I. Schiller
Information Services and Technology
Massachusetts Institute of Technology
77 Massachusetts Avenue Room E17-110A, 32-392
Cambridge, MA 02139-4307
617.910.0259 - Voice
j...@mit.edu
http://jis.qyv.name
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, Sep 02, 2013 at 03:09:31PM -0400, Jerry Leichter wrote:
Google recently switched to 2048 bit keys; hardly any other sites
have done so, and some older software even has trouble talking to
Google as a result.
Btw. As a random side-note.
that when the only copy of your key is in an HSM, the HSM
vendor really owns you key, or at least they own you!
--
Jeffrey I. Schiller
MIT Network Manager
Information Services and Technology
Massachusetts Institute of Technology
77
.
--
=
Jeffrey I. Schiller
MIT Network Manager
Information Services and Technology
Massachusetts Institute of Technology
77 Massachusetts Avenue Room W92-190
Cambridge, MA 02139-4307
617.253.0161 - Voice
[EMAIL PROTECTED