Gentoo Archives: gentoo-user

From: Michael Orlitzky <michael@××××××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Internet security.
Date: Mon, 09 Sep 2013 13:42:37
Message-Id: 522DD044.8080604@orlitzky.com
In Reply to: Re: [gentoo-user] Internet security. by Mick
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 On 09/09/2013 01:28 AM, Mick wrote:
5 >
6 > Are you saying that 2048 RSA keys are no good anymore?
7 >
8
9 They're probably fine, but when you're making them yourself, the extra
10 bits are free. I would assume that the NSA can crack 1024-bit RSA[1],
11 so why not jump to 4096 so you don't have to do this again in a few years?
12
13 The performance overhead is also mostly negligible: the only thing the
14 public key crypto is used for is to exchange a secret which is then
15 used to do simpler (and faster) crypto.
16
17
18 [1]
19 http://blog.erratasec.com/2013/09/tor-is-still-dhe-1024-nsa-crackable.html
20
21 -----BEGIN PGP SIGNATURE-----
22 Version: GnuPG v2.0.20 (GNU/Linux)
23
24 iQIcBAEBAgAGBQJSLdBEAAoJEBxJck0inpOiGg4P/1fBRpLoSsNnzjhFGro6vHOr
25 uf5/xUR8y2M+7sBXsyS6d7uU1GfKcyWW2UnhuMabz6/bLWSmhCeGAZrAw1n1/oqp
26 DcxvT9Z/SWM/taYCGkMcxAh3pMxCTohS7Dpq1NxjjB2J7+GgITCNfn6b1bxrAjjO
27 cWCjrAh9ozESiP7AGM2vt2CR9mC0AsWMEoUk5zF0wd0BZq7cCSbcnxV54E784OVz
28 TXcmhvISHz5cgC5nWTylCgy4BqLp94A7ZjtuvZntTBhAeU9MFWX1FpnrBbbnOwW4
29 WPCYF3mRJKKapE6IIN2jHp1l0w8oM/EFrMoGYYQkAG393TWaRgDLqGqAJBDpLDwP
30 +fmeT/xdfn7nyQNV1IwfdeAdcHFPoKw9dcr2kWVYlx8oJQteibSaQmT9L/LLdJfk
31 5+XgFg2Va6xTx1YsBfRGXc/PIjrQwlJ0rZ2osjKYfE6G1747+sz0fD74rDRoLTrl
32 j8I4QVuMeOqxdXp9hQv6TNuEHXw9vlbKRlOwT/E7sTHWerK5EXFqgUS8txl3Os+3
33 2iNgz7v/0AhMrH0evtzn2k88agjXY1UrqUotHuGndJxyc1ZhXZuoJAOSFcgLv/ko
34 L1Vzl3lOdaj1nF23RMWZoqdaI4BZyBM4zDx7K+0g3e7YadQ/EkD6mof0sVNGpO4a
35 q6PNGNy9oZaWflDAOHaN
36 =Ni4r
37 -----END PGP SIGNATURE-----

Replies

Subject Author
Re: [gentoo-user] Internet security. Mick <michaelkintzios@×××××.com>