[147251] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA equivalent key length/strength

daemon@ATHENA.MIT.EDU (Ben Laurie)
Sat Sep 21 18:17:58 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <523A19BF.2040004@cypherpunks.to>
Date: Fri, 20 Sep 2013 18:34:58 +0100
From: Ben Laurie <ben@links.org>
To: Lucky Green <shamrock@cypherpunks.to>
Cc: Cryptography Mailing List <cryptography@metzdowd.com>,
	Crypto discussion list <cryptography@randombit.net>, moti@cs.columbia.edu
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============1555703613767289829==
Content-Type: multipart/alternative; boundary=047d7bdc90bee7a91504e6d4168f

--047d7bdc90bee7a91504e6d4168f
Content-Type: text/plain; charset=ISO-8859-1

On 18 September 2013 22:23, Lucky Green <shamrock@cypherpunks.to> wrote:

> According to published reports that I saw, NSA/DoD pays $250M (per
> year?) to backdoor cryptographic implementations. I have knowledge of
> only one such effort. That effort involved DoD/NSA paying $10M to a
> leading cryptographic library provider to both implement and set as
> the default the obviously backdoored Dual_EC_DRBG as the default RNG.
>

Surprise! The "leading blah blah" was RSA:
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/.

--047d7bdc90bee7a91504e6d4168f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">=
On 18 September 2013 22:23, Lucky Green <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:shamrock@cypherpunks.to" target=3D"_blank">shamrock@cypherpunks.to</a>=
&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;p=
adding-left:1ex"><div id=3D":1m0" style=3D"overflow:hidden">According to pu=
blished reports that I saw, <span class=3D"">NSA</span>/DoD pays $250M (per=
<br>

year?) to backdoor cryptographic implementations. I have knowledge of<br>
only one such effort. That effort involved DoD/<span class=3D"">NSA</span> =
paying $10M to a<br>
leading cryptographic library provider to both implement and set as<br>
the default the obviously backdoored Dual_EC_DRBG as the default RNG.</div>=
</blockquote></div><br>Surprise! The &quot;leading blah blah&quot; was RSA:=
=A0<a href=3D"http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-=
332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-33265=
5/</a>.</div>
<div class=3D"gmail_extra"><br></div></div>

--047d7bdc90bee7a91504e6d4168f--

--===============1555703613767289829==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============1555703613767289829==--

home help back first fref pref prev next nref lref last post