Re: Hardware potential to duplicate existing host keys... RSA DS

看板FB_security作者時間13年前 (2012/06/25 03:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/26 (看更多)
On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmons0@gmail.com> wrote: > In light of advanced in processors and GPUs, what is the potential for > duplication of RSA, DSA, and ECDSA keys at the current default key > lengths (2048, 1024, and 256 respectively)? > I've been able to duplicate keys for years simply using cp(1) Define "duplicate". Are you asking about some sort of collision? Are you asking about brute forcing an encrypted stream and deducing what the private key is? _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1Fvsio8V (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 3 之 26 篇):
文章代碼(AID): #1Fvsio8V (FB_security)