4900+ entries in 0.463s

ascii_butugychag: and now i wonder how the fuck mircea_popescu can live with
rsa ascii_butugychag: if they aren't prime, you're using multiprime
rsa and if your smallest prime is small, you get, e.g., pollard-rho'd
mircea_popescu: isn't any "
rsa-like" symmetric cypher basically an immature or partial implementation of
ascii_butugychag: i now strongly suspect that blumblumshub can be proven to equal
rsa in hardness
jurov:
RSA's feature that allows bad number generators to aect other keys in such a public way is problematic."
ascii_butugychag: jurov: you can trivially do it right now, just walk all of sks, if the pubkey is - well - public, you can determine that someone
rsa'd to it
mircea_popescu: and incidentally, as a bright mathematical mind pointed out once, "at some point the effort invested in stating
rsa is 'widely researched' exceeds the effort ever expended into researching it"
mircea_popescu: <BingoBoingo>
RSA offers a longer hisotry of being studied and attacked << more importantly, it actually fits in head. a 12 yo's head.
BingoBoingo:
RSA offers a longer hisotry of being studied and attacked
BingoBoingo: Why would anyone use GPG2, or ECC when
RSA is available
BingoBoingo: Generating GPG keys that don't suck is hard because
RSA encryption is decrypted by division. Too easy to divide, falls. ECDSA in Bitcoin gets more breathing room for now because not as straight forward.
assbot: sybren / python-
rsa / Pull request #14: [security] Fix BB'06 attack in verify() by switching from parsing to comparison — Bitbucket ... (
http://bit.ly/1MT5Xn1 )
jurov: gpg: Signature made So 26. december 2015, 01:37:34 CET using
RSA key ID 01ABFFC7
ascii_rear: (how many times can you use, e.g., a pill against
rsa ?)
kakobrekla: gpg: Signature made Sat 26 Dec 2015 12:37:34 AM UTC using
RSA key ID 01ABFFC7
assbot: Logged on 23-12-2015 17:32:23; mircea_popescu:
rsa, sadly, wouldn't really work for this application
ascii_field: mircea_popescu: 'Not only are they part of the transaction, not only are they an integral part of the transaction : they are the only actually needed part. What makes a transaction a transaction is the signature, nothing else. Everything else is like marketing : contributes to costs, not to revenue.' << here i will note that, if bitcoin used
rsa sigs, the tx and the signature could be literally one and the same thing
mircea_popescu: anyway, none of this is even practical without mass cardanos, because iirc c-s consumes even more entropy than
rsa.
mircea_popescu: let us indulge then. cramer-shoup is an asym key system, just like
rsa or ecc.
mircea_popescu: "Although the potential development of quantum computers threatens the security of many common forms of cryptography such as
RSA, "
mircea_popescu: but so far we don't even know if we actually want
rsa (this for lack of gossipd) nor have we studied shoup etc.
mircea_popescu: "Cuccias said that Nest Cam uses 128-bit SSL encryption, Perfect Forward Secrecy and a 2048-bit
RSA key that is unique to each camera. This ensures that videos are not accessible, even over open WiFi networks. That said, customers can always see the status of their camera through the Nest app, "
mircea_popescu: anyway, to put the thing in more distant, and thus perhaps more comprehensible terms even if you'll likely not be able to resist the temptation to crush naisl with the microscope : "what is the value of
rsa to kenyan ?" and "obviously all this 'crypto work' is general 20yo cunt good looks" to kenyan.
ascii_field: 'The AES-256-CBC algorithm is used to encrypt files; all files are encrypted with the same key... In spite of the scary stories about
RSA-2048 shown to victims, this encryption algorithm is not used by the malware in any form... The AES-256-CBC algorithm is used to encrypt files; all files are encrypted with the same key.'
ascii_field: davout: now there's proprietary crud in the cartridge ~and~ the printer that
rsa to one another.
assbot: Logged on 25-10-2015 21:51:05; mircea_popescu: he had a "business" to make 8kb or larger
rsa keys for "Cusomers"
mircea_popescu: he had a "business" to make 8kb or larger
rsa keys for "Cusomers"
☟︎ referredbyloper: Thanks. I just read the post about phuctor breaking an
rsa key.
assbot: On how the factored 4096
RSA keys story was handled, and what it means to you. on Trilema - A blog by Mircea Popescu. ... (
http://bit.ly/1NlQkIc )
ascii_field: cameraball is a hypothetical device consisting of sealed pyrex sphere with two fish-eye cameras inside. charged and addressed via induction coil. contains a certain amount of eeprom, signs each frame with
rsa key, which is zeroed if the glass is penetrated.
ascii_field: (a civilized setup will have
rsa backing on both sides)
phf: so gossipd is "in progress", but fella's not been heard from in a very long time. gpg has not been started, but ascii presumably has a lot of ideas about it. then there's pie in the sky projects, like fabricating own cpus or
rsa over udp routers.
mircea_popescu: can you demonstrate
rsa malleability in the sense of, appending "pete_dushenski.rate.punkman.2:" as prefix to cyphertext ?
ascii_field: so he modifies assbot so that the next time mircea_popescu is given otp token, it is actually carrying the
rsa-enciphered symmetric key from $message
ascii_field: but what you actually decrypted with
rsa was a random blob
ascii_field: the most pedestrian hypothesis here is that
rsa is considerably easier to implement.
mircea_popescu: i find it comedic that for all the "well documented" flaws of
rsa, all these "take over the world" computing schemes fail to use ECC.
ascii_field: mircea_popescu: it has
rsa sig checker in mask rom which runs on reset
assbot: Logged on 21-09-2015 18:16:12; ascii_field: phun phakt: it is not a proven fact that the difficulty of the
rsa problem as such is equivalent to that of factoring.
ascii_field: phun phakt: it is not a proven fact that the difficulty of the
rsa problem as such is equivalent to that of factoring.
☟︎ ascii_field: the reason for this is that (as anyone who stayed awake in kindergarten ??) knows,
rsa operation is malleable
ascii_field: the basic idea of 'padding' is that before you can really use
rsa, you have to proclaim 'i will NEVER EVEN consider a blob that doesn't decrypt to this-standard-boilerplate-and-the-payload' - or, in the case of signatures, 'it is ~not~ a signature unless the signed payload is such-and-such-boilerplate-and-THEN-the-actual-payload'
ascii_field: accompanied by unsubstantiated claims of 'equivalence' between long
rsa and short ecc key 'hardnesses'
ascii_field: e.g., the push for movement from
rsa to ecc
punkman: " Cross-VM
RSA Key Recovery in a Public Cloud"
mircea_popescu: "You dont need entropy to create an ECDSA signature. You do need it to create an
RSA signature, for padding."