[147412] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] are ECDSA curves provably not cooked? (Re: RSA

daemon@ATHENA.MIT.EDU (Tony Arcieri)
Tue Oct 1 13:55:13 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <20131001165159.GA12930@netbook.cypherspace.org>
From: Tony Arcieri <bascule@gmail.com>
Date: Tue, 1 Oct 2013 10:54:13 -0700
To: Adam Back <adam@cypherspace.org>
Cc: John Kelsey <crypto.jmk@gmail.com>, Gregory Maxwell <gmaxwell@gmail.com>,
	cryptography <cryptography@metzdowd.com>,
	Crypto List <cryptography@randombit.net>,
	"jamesd@echeque.com" <jamesd@echeque.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============0142975510409492459==
Content-Type: multipart/alternative; boundary=047d7b343eca2ed70f04e7b1a582

--047d7b343eca2ed70f04e7b1a582
Content-Type: text/plain; charset=ISO-8859-1

On Tue, Oct 1, 2013 at 9:51 AM, Adam Back <adam@cypherspace.org> wrote:

> Right but weak parameter arguments are very dangerous - the US national
> infrastructure they're supposed to be protecting could be weakened when
> someone else finds the weakness.


As the fallout from the Snowden debacle has shown (with estimates of the
damage to US businesses in the tens of billions) the NSA seems to be
unconcerned with the blowback potential of doing things that are
potentially damaging when discovered. I wouldn't put it past them to
intentionally weaken the NIST curves.

That said, my gut feeling is they probably didn't.

-- 
Tony Arcieri

--047d7b343eca2ed70f04e7b1a582
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Tue, Oct 1, 2013 at 9:51 AM, Adam Back <span dir=3D"ltr=
">&lt;<a href=3D"mailto:adam@cypherspace.org" target=3D"_blank">adam@cypher=
space.org</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D=
"gmail_quote">

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Right but weak parameter arguments are very =
dangerous - the US national<br>
infrastructure they&#39;re supposed to be protecting could be weakened when=
<br>
someone else finds the weakness.</blockquote><div><br></div><div>As the fal=
lout from the Snowden debacle has shown (with estimates of the damage to US=
 businesses in the tens of billions) the NSA seems to be unconcerned with t=
he blowback potential of doing things that are potentially damaging when di=
scovered. I wouldn&#39;t put it past them to intentionally weaken the NIST =
curves.</div>

<div><br></div><div>That said, my gut feeling is they probably didn&#39;t.<=
/div></div><div><br></div>-- <br>Tony Arcieri<br>
</div></div>

--047d7b343eca2ed70f04e7b1a582--

--===============0142975510409492459==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============0142975510409492459==--

home help back first fref pref prev next nref lref last post