Jump to content
  • 0

Licensing Plugin


SimplyDigitalHosting

Question

10 answers to this question

Recommended Posts

  • 0

I feel yours would be better as I know it uses RSA.

 

Please consider

 

http://phys.org/news/2013-12-trio-rsa-encryption-keys-noise.html - "Research trio crack RSA encryption keys by listening to computer noise"

 

http://www.forbes.com/sites/timworstall/2013/12/21/researchers-break-rsa-4096-encryption-with-just-a-microphone-and-a-couple-of-emails/  - "NSA paid RSA $10 million to adopt an algorithm that wasn’t entirely secure"

Link to comment
Share on other sites

  • 0

Please consider

 

http://phys.org/news/2013-12-trio-rsa-encryption-keys-noise.html - "Research trio crack RSA encryption keys by listening to computer noise"

 

http://www.forbes.com/sites/timworstall/2013/12/21/researchers-break-rsa-4096-encryption-with-just-a-microphone-and-a-couple-of-emails/  - "NSA paid RSA $10 million to adopt an algorithm that wasn’t entirely secure"

First link is kind of one of those paranoia scenarios though.  There's a bit of sceince involved that if you want to go to that extreme then you as a sysadmin has more concerns to deal with.

 

As for the NSA one, meh.  The RSA algorithm has been implemented by other sources given PKI and the Diffie-Hellman algorithm is public domain essentially.  So just because RSA was bought out doesn't mean the RSA algorithm itself is unsafe, you just have to know where the algorithm came from.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Answer this question...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...