Re: Hardware potential to duplicate existing host keys... RSA DS

看板FB_security作者時間13年前 (2012/06/25 05:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串7/26 (看更多)
On Sun, Jun 24, 2012 at 5:18 PM, Dag-Erling Sm=F8rgrav <des@des.no> wrote: > Robert Simmons <rsimmons0@gmail.com> writes: >> In light of advanced in processors and GPUs, what is the potential for >> duplication of RSA, DSA, and ECDSA keys at the current default key >> lengths (2048, 1024, and 256 respectively)? > > You do know that these keys are used only for authentication, and not > for encryption, right? Yes, the encryption key length is determined by which symmetric cipher is negotiated between the client and server based on what is available from the Ciphers line in sshd_config and ssh_config. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FvuTIOa (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 7 之 26 篇):
文章代碼(AID): #1FvuTIOa (FB_security)