500+ entries in 0.087s
diana_coman: mircea_popescu: it has indeed everything needed as far as I know and certainly
rsa, keccak, oaep, the whole package.
mircea_popescu: diana_coman, afaik it actually has evreything needed, including
rsa, hash function, oaep even ? just no pss implemented ?
ossabot: Logged on 2019-01-13 09:29:50 mircea_popescu: ad interim the draft is, that the client stores all the keys (
rsa, serpent, whatever) one per line, the
rsa ones in republican format, the rest unspecified as of yet, in a file called keys.tmsr encrypted by the
rsa key of the client.
diana_coman: mircea_popescu: we have eucrypt that generates the
rsa keys and serpent and all that client and server need; we however do not have (and it was supposedly in discussion/waiting/etc) a clear way to store them securely; let me dig log ref
ossabot: Logged on 2019-10-18 16:39:33 mp_en_viaje: if you're interested in my (allegedly clueless, as it periodically is) understanding of the matter, alf wasn't interested in baking you a
rsa chip because the item is not currently feasible. it specifically requires an object not yet known to exist, the extremely long mult'er.
ossabot: Logged on 2019-10-18 16:36:28 trinque: I even told alf I had the cash to do an experimental run of the
RSA chip, and he ignored, because why have friends
mp_en_viaje: if you're interested in my (allegedly clueless, as it periodically is) understanding of the matter, alf wasn't interested in baking you a
rsa chip because the item is not currently feasible. it specifically requires an object not yet known to exist, the extremely long mult'er.
trinque: I even told alf I had the cash to do an experimental run of the
RSA chip, and he ignored, because why have friends
trinque: I think it's hard to see the market, but in the last thread about the hardware
RSA device it was clear I wasn't talking about market the same way as you, and that's where the clarity ended.
diana_coman: I still need to run tests and timings re "fast" but as a principle, it's not the first requirement (
rsa is not for speed anyway)
mircea_popescu: -ChanServ- [#trilema] To speak in #trilema you must be voiced. If you have a
RSA key registered with deedbot, send !!up to it in a private message, decrypt the challenge string and return it with !!v ; else politely ask one of the voiced people to voice you. << meanwhile became total bs.
a111: Logged on 2019-07-29 13:48 asciilifeform:
http://btcbase.org/log/2019-07-29#1925432 << needs keccak to actually
rsa 'in anger', picked this up nao that asciilifeform returned from awol (where wrote 4l ln of ultimately failed asm experiment 'm') . but also thought about this point prior, will elaborate :
a111: Logged on 2019-07-29 11:16 mp_en_viaje: re "drop shitty gpg" : the one remaining issue is key bootstrapping. to use peh instead of gpg one can't just keep plaintext
rsa privkeys ; but peh has no built-in symmcipher either, so wut do.
mp_en_viaje: re "drop shitty gpg" : the one remaining issue is key bootstrapping. to use peh instead of gpg one can't just keep plaintext
rsa privkeys ; but peh has no built-in symmcipher either, so wut do.
☟︎ ave1: 4096-bit
RSA key, ID 14D30364, created 2017-05-18 "ave--"
mod6: ssh -o ServerAliveInterval=5 -o ServerAliveCountMax=3 -i ~/.ssh/key_for_remote_host_id_rsa girlattorney@A.B.C.D -D 127.0.0.1:56565
stjohn_piano_2: gpg: encrypted with 4096-bit
RSA key, ID 625FF273, created 2019-04-15 "stjohn_piano_2"
stjohn_piano_2: asciilifeform: when i run your command there, I get: "gpg: encrypted with
RSA key, ID C8EFFF13, gpg: decryption failed: secret key not available"
a111: Logged on 2014-02-15 20:33 asciilifeform: betcha if you plucked the quasi-mythical Pill Against
RSA from its Indiana Jones subterranean vault, perhaps six people alive would understand what they are looking at were it shown to them.
mircea_popescu: act~ definition of interesting ; concrete definitions are things like "write a tape to do
rsa with".)
diana_coman: hm, it's all about what the task does so I suppose it's enough to plonk in there some
rsa ops
mircea_popescu: (the view that gpg aka koch-
rsa leaks bits via signature isn't entirely dispelled even today)
a111: Logged on 2017-10-09 16:39 asciilifeform: ... it follows that a 0.85sec 4096b modexp is all you need for a reasonable '
rsa phone' item.
mircea_popescu: ad interim the draft is, that the client stores all the keys (
rsa, serpent, whatever) one per line, the
rsa ones in republican format, the rest unspecified as of yet, in a file called keys.tmsr encrypted by the
rsa key of the client.
mircea_popescu: just note that eucrypt having
rsa does in no manner hurt your serpent-only-phonecrypto putative app ; just like it having serpent dun hurt a "this is my pgp implementation" usecase, and so on.
mircea_popescu: i thought this entire discussion was a) specifiucally as to daykin (not to stein) and b) specifically as to primegen for
rsa secret key baking, (not "in general math functions).
mircea_popescu: cuz im not going to have non-2048 factors in my 4086 bit
rsa key, wtf.
mircea_popescu: had you instead used 32 bit
rsa, you'd have had two 16 bit primes you'd have daykin'd with 2×3×4×7×11×13 aka 0x5DD8
mircea_popescu: consider the simpler case of 16 bit
rsa. you thus make two 8 bit primes. you daykin each of these with 210, which happens to be the 8 bit primorial, aka 11010010.
mircea_popescu: asciilifeform it doesn't ; nor will it, because what truly brings serpent in is the ~space~ not the time problem. ie, because of padding, straight
rsa doubles message bulk, which is a major problem for online game.