Re: [cryptography] What's the state of the art in factorization?

2010-07-11 Thread Francois Grieu
On 23/04/2010 11:57, Paul Crowley wrote: [2] http://www.cs.umd.edu/~jkatz/papers/dh-sigs-full.pdf My preferred signature scheme is the second, DDH-based one in the linked paper, since it produces shorter signatures - are there any proposals which improve on that? There is RSA or Rabin using

Re: Spy/Counterspy

2010-07-11 Thread Christoph Gruber
-- Christoph Gruber If privacy is outlawed, only outlaws will have privacy. Phil Zimmermann Am 10.07.2010 um 12:57 schrieb Jerry Leichter leich...@lrw.com: On Jul 9, 2010, at 1:00 PM, Pawel wrote: Hi, On Apr 27, 2010, at 5:38 AM, Peter Gutmann (alt) pgut001.reflec...@gmail.com

Re: 1280-Bit RSA

2010-07-11 Thread Zooko O'Whielacronx
Dan: You didn't mention the option of switching to elliptic curves. A 256-bit elliptic curve is probably stronger than 2048-bit RSA [1] while also being more efficient in every way except for CPU cost for verifying signatures or encrypting [2]. I like the Brainpool curves which comes with a

Re: 1280-Bit RSA

2010-07-11 Thread Samuel Neves
On 11-07-2010 01:11, Brandon Enright wrote: On Fri, 9 Jul 2010 21:16:30 -0400 (EDT) Jonathan Thornburg jth...@astro.indiana.edu wrote: The following usenet posting from 1993 provides an interesting bit (no pun itended) of history on RSA key sizes. The key passage is the last paragraph,

Re: Spy/Counterspy

2010-07-11 Thread Ben Laurie
On 10 July 2010 11:57, Jerry Leichter leich...@lrw.com wrote: Beyond simple hacking - someone is quoted saying You can consider GPS a little like computers before the first virus - if I had stood here before then and cried about the risks, you would've asked 'why would anyone bother?'. - among

Re: Spy/Counterspy

2010-07-11 Thread Jerry Leichter
On Jul 11, 2010, at 1:16 PM, Ben Laurie wrote: Beyond simple hacking - someone is quoted saying You can consider GPS a little like computers before the first virus - if I had stood here before then and cried about the risks, you would've asked 'why would anyone bother?'. - among the

Location services risks (was: Re: Spy/Counterspy)

2010-07-11 Thread John Ioannidis
Location-based services are already being used for dating services (big surprise here). Mobiles send their location to a server, the server figures out who is near whom, and matches them. There are lots of variants on that. An obvious risk here is that the server is acting as a location

Anyone make any sense out of this skype hack announcement?

2010-07-11 Thread Perry E. Metzger
I got pointed at this, and it is written unclearly enough that I have no idea what to make of it: http://www.enrupt.com/index.php/2010/07/07/skype-biggest-secret-revealed -- Perry E. Metzgerpe...@piermont.com -

Fw: [IP] DARPA BAA on homomorphic encryption

2010-07-11 Thread Perry E. Metzger
Begin forwarded message: Date: Sun, 11 Jul 2010 18:11:56 -0400 From: David Farber d...@farber.net To: ip i...@v2.listbox.com Subject: [IP] DARPA BAA on homomorphic encryption There’s a new DARPA BAA on homomorphic encryption: https://www.fbo.gov/utils/view?id=11be1516746ea13def0e82984d39f59b