Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Levi Ramsey (lramseystudent.umass.edu)
Date: Mon Mar 25 2002 - 23:12:07 CST
On Mon Mar 25 20:22 -0700, Vincent Danen wrote:
> It's sad that it only uses a maximum of 256 bits, but I guess it has
> to be low enough so that it can be fast enough to be useable. I just
> read a rather disconcerting message on bugtraq about 1024 bit
> encryption in PKI (ie. pgp/gpg/ssh keys, etc.), and how easily it can
> now, conceivably, be cracked. I'll forward a copy to the list for
Is the encrypted filesystem support in 8.2 public key? I would have
expected it to be symmetric.
Also, the advancement, as I understand it, is only a problem for
algorithims that depend on the difficulty of factoring prime numbers.
So all is not lost.
It does raise a few concerns, but then I've always taken the view that
encryption cannot protect you against TLA's and other organizations with
large budgets. Who's to say that the NSA, for instance, hasn't already
cracked the algorithim for PGP? Remember, they knew about differential
cryptography 20 years before it was "discovered".
-- Levi Ramsey lramseystudent.umass.edu lramseycrystalorb.net
When it comes down to desperation, You make the best of your situation. Linux 2.4.18-6mdk 12:01am up 9:03, 9 users, load average: 0.39, 0.29, 0.19
For help, email discuss-helpmandrakesecure.net; to unsubscribe send a message to discuss-unsubscribemandrakesecure.net. To visit MandrakeSecure, go to http://www.mandrakesecure.net/.