log☇︎
5134 entries in 1.048s
Apocalyptic: i trust EC based crypto much more than RSA...
BingoBoingo: I don't trust EC crypto that much. Maybe when they refactor Bitmessage to work off of RSA coin maybe.
asciilifeform: just as RSA-breaking has not been proven to require fast factoring.
asciilifeform: simplest way i can think of is rsa with >2 private primes (lamport, or see MP's writeup)
BingoBoingo: I mean RSA is old, 70's math and still stands with proper key pairs. It seems the kind of asymmetric encryption still. I mean how did Rand corporation grow so big?
ozbot: S.NSA - RSA public key factorisation webservice pe Trilema - Un blog de Mircea Popescu.
mircea_popescu: http://trilema.com/2013/snsa-rsa-public-key-factorisation-webservice/
ozbot: A Few Thoughts on Cryptographic Engineering: RSA warns developers not to use RSA products
mircea_popescu: http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
asciilifeform: if you were the fuhrer of NSA, and your minions have not yet found a pill against rsa/etc., what would you do?
jurov: prolly needs cryptographer to decide how best to conver RSA/DSA privkey to bitcoin 256bit one
jurov: simckles, the RSA news is old and about proprietary product
smickles: ;;later tell mircea_popescu http://www.computing.co.uk/ctg/news/2295881/rsa-warns-customers-against-nsa-compromised-security-product
mod6: next week too (after sunday) i'll be testing to make sure that the RSA enc/dec of the cmds is working as it should.
mircea_popescu: then rsa is probably the correct choice.
mod6: bouncy-castle is this lib that is available for use, which works fine with RSA but when it comes to DH/DSS or DSA/ElGamal no worky.
mod6: in the mean time i've been plowing ahead on the android tool. done well with that. gotten RSA clearsign/enc/dec working. so that felt great.
benkay: and given that the nsa figured out the fundamentals of rsa before rivest shamir and adelman, i'd bet they have a functional quantum emulator in silicon
jurov: well, they tried to do AES/RSA on forth multicore chip:
jorash: arbitrarily large integers and output constituent primes very quicly (breaks RSA, ECC). So far we have raised 11btc in this ask, with another party interested to contribute 40BTC. So I am seeking 149BTC. Payout by mining will be 10x-30x in the Grover's case.
thestringpuller: Hmm. In crytpo-news: Both RSA and Diffie-Hellman encryption rely on there being no efficient algorithm for that problem, but French math professor Antoine Joux has published two papers in the last six months that suggest one could soon be found. Security researchers that noticed Joux's work recommend companies large and small begin planning to move to elliptic curve cryptography, something the NSA has said is best practice for years. Unfortunat
mircea_popescu: why do they need to calculate rsa or wut ?
asciilifeform: mircea_popescu: yes, the girls calculate RSA signatures for you with paper and pencil
asciilifeform: you buy an XYZ pair of shoes. and it would come with a unique (verifiable through the net) RSA-signed message, with a serial number, stating that the unit is genuine and was sold in such-and-such a place on such a date.
thestringpuller: but you have to convert you DSA/RSA keys into dropbear format
iz: jcpham: i cracked RSA in a similar way one... just guessed the private key.. :b
mircea_popescu: there's no js rsa
mircea_popescu: they have javascript rsa
Diablo-D3: we can have multiple public keys for a single private key under rsa
Diablo-D3: it only sends id_dsa/rsa now
rg: debug1: Offering public key: /jl/.ssh/id_rsa
rg: no.. ssh uses id_dsa/rsa
rg: if a system was already compromised, rsa isnt going to do much
mircea_popescu: In June, 2012, a team of computer scientists claimed to have developed a method of quickly extracting the secret key generated by several RSA dongles including the SecurID 800. Calling themselves "Team Prosecco," the group published a research paper documenting their findings which they plan to present at a cryptography conference in August, 2012.