| Which is by the way exactly the case with SecureIM. How
| hard is it to brute-force 128-bit DH ? My guesstimate
| is it's an order of minutes or even seconds, depending
| on CPU resources.
Sun's Secure NFS product from the 1980s had 192-bit Diffie-Hellman,
and a comment in one of the
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Leichter, Jerry
Sent: Monday, October 08, 2007 11:48 AM
To: Alex Pankratov
Cc: cryptography@metzdowd.com
Subject: RE: Trillian Secure IM
| But, opportunistic cryptography is even more fun
Why bother with all this? There is OTP for gaim, and it works just fine
(not to mention it comes from a definitely clueful source).
/ji
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to
[EMAIL PROTECTED] wrote:
Why bother with all this? There is OTP for gaim, and it works just fine
(not to mention it comes from a definitely clueful source).
/ji
I meant, of course, OTR (off-the-record). And to think that I was using
it in another window as I was typing this!
Thanks to
-Original Message-
From: Ian G [mailto:[EMAIL PROTECTED]
Sent: Monday, October 08, 2007 6:05 AM
To: Peter Gutmann
Cc: [EMAIL PROTECTED]; cryptography@metzdowd.com
Subject: Re: Trillian Secure IM
Peter Gutmann wrote:
Alex Pankratov [EMAIL PROTECTED] writes:
SecureIM
| But, opportunistic cryptography is even more fun. It is
| very encouraging to see projects implement cryptography in
| limited forms. A system that uses a primitive form of
| encryption is many orders of magnitude more secure than a
| system that implements none.
|
| Primitive form -