Hardware potential to duplicate existing host keys... RSA DSA
ECDSA was Add rc.conf variables...
Dag-Erling Smørgrav
des at des.no
Sun Jun 24 21:18:22 UTC 2012
Robert Simmons <rsimmons0 at gmail.com> writes:
> In light of advanced in processors and GPUs, what is the potential for
> duplication of RSA, DSA, and ECDSA keys at the current default key
> lengths (2048, 1024, and 256 respectively)?
You do know that these keys are used only for authentication, and not
for encryption, right?
DES
--
Dag-Erling Smørgrav - des at des.no
More information about the freebsd-security
mailing list