[147392] in cryptography@c2.net mail archive
Re: [Cryptography] RSA equivalent key length/strength
daemon@ATHENA.MIT.EDU (ianG)
Tue Oct 1 11:52:24 2013
X-Original-To: cryptography@metzdowd.com
Date: Tue, 01 Oct 2013 12:02:36 +0300
From: ianG <iang@iang.org>
To: cryptography@metzdowd.com
In-Reply-To: <524728B0.6020600@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 28/09/13 22:06 PM, ianG wrote:
> On 27/09/13 18:23 PM, Phillip Hallam-Baker wrote:
>
>> Problem with the NSA is that its Jekyll and Hyde. There is the good side
>> trying to improve security and the dark side trying to break it. Which
>> side did the push for EC come from?
>
>
> What's in Suite A? Will probably illuminate that question...
Just to clarify my original poser -- which *public key methods* are
suggested in Suite A?
RSA? EC? diversified keys? Something new?
The answer will probably illuminate what the NSA really thinks about EC.
(As well as get us all put in jail for thought-crime.)
iang
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography