More secure use of DSA?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



It is *not* keyspace. It is algorithm *strength* (complexity/best known effort required to break it) expressed through key length. Again, propose better ways if you can.

So what's your proposed method of combining algorithms?? You reject the commonly accepted approach, but when asked to offer an alternative, you start evading? Do you have no alternative then?

Sent?from?my?BlackBerry?10?smartphone?on?the Verizon?Wireless?4G?LTE?network.
? Original Message ?
From: Salz, Rich
Sent: Sunday, September 4, 2016 14:02
To: openssl-users at openssl.org; noloader at gmail.com
Reply To: openssl-users at openssl.org
Subject: Re: More secure use of DSA?


> Disagree? Then propose a better way to combine algorithms.

Sure, just explain to my first why DSA keyspace means exactly the same thing as AES keyspace.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4350 bytes
Desc: not available
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160904/4002a470/attachment.bin>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux