[147339] in cryptography@c2.net mail archive
Re: [Cryptography] RSA equivalent key length/strength
daemon@ATHENA.MIT.EDU (David Kuehling)
Mon Sep 30 10:06:21 2013
X-Original-To: cryptography@metzdowd.com
From: David Kuehling <dvdkhlng@posteo.de>
To: jamesd@echeque.com
Date: Mon, 30 Sep 2013 09:42:54 +0200
In-Reply-To: <5248C0B2.6090406@echeque.com> (James A. Donald's message of
"Mon, 30 Sep 2013 10:07:14 +1000")
Cc: Perrys crypto list <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============6951270286950485359==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha256; protocol="application/pgp-signature"
--=-=-=
Content-Transfer-Encoding: quoted-printable
>>>>> "James" =3D=3D James A Donald <jamesd@echeque.com> writes:
> Gregory Maxwell on the Tor-talk list has found that NIST approved
> curves, which is to say NSA approved curves, were not generated by the
> claimed procedure, which is a very strong indication that if you use
> NIST curves in your cryptography, NSA can read your encrypted data.
Just for completeness, I think this is the Mail you're referring to:
https://lists.torproject.org/pipermail/tor-talk/2013-September/029956.html
David
=2D-=20
GnuPG public key: http://dvdkhlng.users.sourceforge.net/dk2.gpg
Fingerprint: B63B 6AF2 4EEB F033 46F7 7F1D 935E 6F08 E457 205F
--=-=-=
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iF4EAREIAAYFAlJJK34ACgkQk15vCORXIF/ADAD+IW6WKixIMC655J9YGOkUOMZy
7/EkwR+/3rwYLGazt6QA/0PcMID1/tCMkwWFP+jnk0p3WtILMGeOU0jjSnMH1f9Y
=7W2q
-----END PGP SIGNATURE-----
--=-=-=--
--===============6951270286950485359==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6951270286950485359==--