4200+ entries in 0.295s

mircea_popescu: and i'm going to write up that " "If you need more security than
RSA-2048 offers, the way to go would be to switch to elliptical curve cryptography" nonsense ; because it's getting ridiculous
PeterL: "
RSA-4096 is not a bad idea: its just, generally speaking, unnecessary. You gain very little in the way of additional resistance to brute-forcing and cryptanalysis."
mircea_popescu: phuctor hopper takes republican e,N,comment format for
rsa yes ?
mircea_popescu: o right, because it's
rsa 2048, so e should be 2048 bits. makes sense >.<
mircea_popescu: kmalkki> 0x40 N bytes public exponent (N = 0x100 for
RSA-2048) << o seriously, e is 256 bits long ?
kmalkki: same as before, but from 0x240 starts signature with
RSA-SSA-SIGN with AMD's private key
kmalkki: 0x40 N bytes public exponent (N = 0x100 for
RSA-2048)
mircea_popescu: kmalkki consider registering your
rsa key with deedbot.
mircea_popescu: how is
rsa supposed to work with different exponents ?
mircea_popescu: in other news, this whole "noobs meet bitcoin,
rsa and deedbot via eulora" thing is so very instructive.
Framedragger: this relates to the "not a bank if no
rsa in relevant wot" point.
mircea_popescu: hey, you're breaking
rsa over there, do some useful stuff!
mircea_popescu: asciilifeform because he decides when you find out
rsa was broken
mircea_popescu: because of the whole "array of keys" thing, it'd actually allow jumping over dead
rsa mircea_popescu: J.sign("Here's the laydown : 1.
rsa got fucked, this is the process to exrtract privkey from pubkey ; 2. message so-and-so on deedbot was creating by so-hashing this salt and this pubkey ; 3. this here key J was created by using cryptoisystem ? with rng = privkey.K, which guarantees i am the one that made it ; 4. please use this here J' in future")
mircea_popescu: well no, i just publish the fingerprint. as per t2 =
rsa broken, it then follows one can extract privkey.K from K
mircea_popescu: at t2+epsilon, everyone can verify K-J continuity ; at t2 only breaker of
rsa can verify.
mircea_popescu: t1 : i make
rsa key K ; don't share it with anyone. i publish hash(salt+pubkey.K)
mircea_popescu: asciilifeform incidentally, this suggests an extremely cheap way to fuck with the empire. produce mini board that outputs salt-hashed counter nonce,
rsa and emit it.
scriba: Logged on 2016-09-21: [01:35:42] <asciilifeform> it's never 'maybe this relies on an unproven equivalence to
rsa' and always 'let's million ecdsa sig per second on intel box'
scriba: Logged on 2016-09-21: [01:35:42] <asciilifeform> it's never 'maybe this relies on an unproven equivalence to
rsa' and always 'let's million ecdsa sig per second on intel box'
mircea_popescu: seems to me a fine definition of "working computer" is irc+
rsa.
trinque: asciilifeform: yeah, and I said a while back I will perhaps sign an implementation of
RSA, but *never* a large crypto library
jurov: ben_vulpes: but no
rsa signatures re involved!
jurov: but ben_vulpes is proll going for remote activation by
rsa sig via gossipd
a111: Logged on 2016-09-09 14:36 mod6: someday, when we have a tmsr cryptolib &
rsa-o-matic, maybe we can starting building a gossipd prototype.
mod6: someday, when we have a tmsr cryptolib &
rsa-o-matic, maybe we can starting building a gossipd prototype.
☟︎ mircea_popescu: in any case
rsa signatures are contrary to this, however.
PeterL: so I was thinking about hawala/wotcoin, would it be reasonable to make some sort of client that eats
RSA messages in a sort of [date amount unit RSAkeyIssuer FromRSAkey ToRSAKey] set protocol? each Issuer would have a DB with balances they see, and using WoT could connect multiple issuers?