[147392] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA equivalent key length/strength

daemon@ATHENA.MIT.EDU (ianG)
Tue Oct 1 11:52:24 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 01 Oct 2013 12:02:36 +0300
From: ianG <iang@iang.org>
To: cryptography@metzdowd.com
In-Reply-To: <524728B0.6020600@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 28/09/13 22:06 PM, ianG wrote:
> On 27/09/13 18:23 PM, Phillip Hallam-Baker wrote:
>
>> Problem with the NSA is that its Jekyll and Hyde. There is the good side
>> trying to improve security and the dark side trying to break it. Which
>> side did the push for EC come from?
>
>
> What's in Suite A?  Will probably illuminate that question...


Just to clarify my original poser -- which *public key methods* are 
suggested in Suite A?

RSA?  EC?  diversified keys?  Something new?

The answer will probably illuminate what the NSA really thinks about EC.

(As well as get us all put in jail for thought-crime.)



iang

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post