On Tue, Oct 20, 2015 at 7:43 PM, Giancarlo Razzolini
wrote:
> Em 20-10-2015 10:25, Kimmo Paasiala escreveu:
>> Someone correct me if I'm wrong but as far as I know the prime numbers
>> used in DH group exchange are not secret but must be known by everyone
>> (and couple
On Sat, Oct 17, 2015 at 11:57 AM,
<22xtrv+f800c4addk...@guerrillamail.com> wrote:
> According to
> https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-m
> uch-crypto/
>
> "Since a handful of primes are so widely reused, the payoff, in
> terms of connections they could
Em 20-10-2015 10:25, Kimmo Paasiala escreveu:
> Someone correct me if I'm wrong but as far as I know the prime numbers
> used in DH group exchange are not secret but must be known by everyone
> (and couple other parameters are also public) for the key exchange to
> be possible in the first place.
Also see: http://www.openbsd.org/58.html
Search that page for 1024 (two occurrences).
On 17 October 2015 at 14:03, Stuart Henderson wrote:
> On 2015-10-17, <22xtrv+f800c4addk...@guerrillamail.com> <
> 22xtrv+f800c4addk...@guerrillamail.com> wrote:
> > According to
> >
>
> How is the prime set up for DH in
> OpenSSH and is that something a user can change?
Here is good place to start looking:
==
From: Damien Miller
Subject: CVS: cvs.openbsd.org: src
To: source-chan...@openbsd.org
Date: Fri,
According to
https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-m
uch-crypto/
"Since a handful of primes are so widely reused, the payoff, in
terms of connections they could decrypt, would be enormous. Breaking a single,
common 1024-bit prime would allow NSA to passively
On 2015-10-17, <22xtrv+f800c4addk...@guerrillamail.com>
<22xtrv+f800c4addk...@guerrillamail.com> wrote:
> According to
> https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-m
> uch-crypto/
>
> "Since a handful of primes are so widely reused, the payoff, in
> terms of
7 matches
Mail list logo