On Fri, 9 Jul 2010 21:16:30 -0400 (EDT)
Jonathan Thornburg jth...@astro.indiana.edu wrote:
The following usenet posting from 1993 provides an interesting bit
(no pun itended) of history on RSA key sizes. The key passage is the
last paragraph, asserting that 1024-bit keys should be ok (safe
On Thu, 1 Jul 2010 06:46:30 +0200
Dan Kaminsky d...@doxpara.com wrote:
All,
I've got a perfect vs. good question.
NIST is pushing RSA-2048. And I think we all agree that's
probably a good thing.
However, performance on RSA-2048 is too low for a number of real
world uses.
On Thu, 2 Jul 2009 20:51:47 -0700 or thereabouts Joseph Ashwood
ashw...@msn.com wrote:
Sent: Wednesday, July 01, 2009 4:05 PM
Subject: MD6 withdrawn from SHA-3 competition
Also from Bruce Schneier, a report that MD6 was withdrawn from the
SHA-3 competition because of performance
On Wed, 6 May 2009 20:54:34 -0400
Steven M. Bellovin s...@cs.columbia.edu wrote:
On Thu, 30 Apr 2009 17:44:53 -0700
Jon Callas j...@callas.org wrote:
The accepted wisdom
on 80-bit security (which includes SHA-1, 1024-bit RSA and DSA keys,
and other things) is that it is to be retired by
On Fri, 28 Dec 2007 09:06:44 -0800 or thereabouts ' =JeffH '
[EMAIL PROTECTED] wrote:
Storm, Nugache lead dangerous new botnet barrage
By Dennis Fisher, Executive Editor
19 Dec 2007 | SearchSecurity.com
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1286808
On Mon, 22 Oct 2007 17:55:39 -0700 plus or minus some time ' =JeffH '
[EMAIL PROTECTED] wrote:
...snip...
I will be presenting /some/ of this work at Toorcon in San Diego this
Saturday:
http://www.toorcon.org/2007/event.php?id=38
excellent, how'd it go? Anyone else present on
On Mon, 15 Oct 2007 16:02:54 -0700 plus or minus some time ' =JeffH '
[EMAIL PROTECTED] wrote:
I haven't come across any detailed Storm extent analysis, even with
having Google search specific security company sites (e.g. using
site:sec-corp.com). So if anyone has pointers to pages (other
On Sun, 2 Sep 2007 14:48:31 +0200 plus or minus some time Guus Sliepen
[EMAIL PROTECTED] wrote:
Experience with tinc (a VPN daemon with peer-to-peer like architecture,
which replicates certain information to all daemons in a single VPN),
showed that even in a network with only 20 nodes, it is