Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

Dag-Erling Smørgrav des at des.no
Sun Jun 24 21:18:22 UTC 2012


Robert Simmons <rsimmons0 at gmail.com> writes:
> In light of advanced in processors and GPUs, what is the potential for
> duplication of RSA, DSA, and ECDSA keys at the current default key
> lengths (2048, 1024, and 256 respectively)?

You do know that these keys are used only for authentication, and not
for encryption, right?

DES
-- 
Dag-Erling Smørgrav - des at des.no


More information about the freebsd-security mailing list