1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA512 |
3 |
|
4 |
On 01/12/2015 07:29 PM, Rich Freeman wrote: |
5 |
> On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand |
6 |
> <k_f@g.o> wrote: |
7 |
>> |
8 |
>> One issue with DSA/ElGamal is the requirement for a random k |
9 |
>> value while signing/encrypting, |
10 |
> |
11 |
> Thanks - that was very informative. I guess the thing that makes |
12 |
> me more concerned about RSA is that Shor's algorithm makes it |
13 |
> quite possible that it will be defeated at some point in the |
14 |
> future, perhaps without public disclosure. |
15 |
|
16 |
Shor's would be effective against discrete logs (including ECC) as |
17 |
well, so wouldn't be applicable to this selection. For post-quantum |
18 |
asymmetric crypto we'd likely need e.g a lattice based primitive. |
19 |
|
20 |
- -- |
21 |
Kristian Fiskerstrand |
22 |
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net |
23 |
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 |
24 |
-----BEGIN PGP SIGNATURE----- |
25 |
|
26 |
iQIcBAEBCgAGBQJUtBYdAAoJEPw7F94F4TagA0cP/1fUOfyn+goHBJUPsrqNBt72 |
27 |
tkEShCRRtdqwknPf5XYR5oM3jRpG9QZ4L89vjXC/3SklIT1wz+IFLkUgJHbfg33k |
28 |
rbmr6oMXbQaqHami3l646DMjoqItLl1Nlnd5sqTVSBEB16KiJGE3oCVTAX6KisFW |
29 |
72chafJh+4x9Cbbt48PL1FjCiLDunokCOHPtbXthkL2NJaPnIJh7HHCQk2CtgFZX |
30 |
tER2gXai7VsQMMQdO9VuwNvrFS1svWFK97Eba1xgQx7tMg4hxWJadQphlwMKMEj+ |
31 |
uvZZ0HE708AUYBah+VCNJRFbJpyoND+7prUR19MnleUfehLWZHNUaOc1G8PK8X2b |
32 |
GhH6fe2wft05e8jrfMgV0acECqdvsb82zvfYQRVksQbtxdhTB3ObPcBLYveG6tQU |
33 |
IKLv47imTGAIW+Hwqk7EYQpLAMCcNhLmnwOdIe3CT+pvnluiGKZ55O67DJvE5QPS |
34 |
goPkh8nmSRIcLdCYyJxU0X+nODQLUNi0sb1b8ryKM1OLz2jSq2vhehet0jZ8vu2T |
35 |
0FpHKKo0dK7QTQQMmaoQ4Opfe3fff3kROhq3o0h6XMEg6niyzObg87ULecqKq59w |
36 |
CfeYHq6RIKnc3Yfn0flzcAlKXVlW+dpcHS1hXHiaLrO6iVtvtfZxBG4mAUZuqWyi |
37 |
k4FfOwRIvhFN5nTvM/TF |
38 |
=yIog |
39 |
-----END PGP SIGNATURE----- |