[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: EE Times on PRZ
Hal wrote:
>This, from a sidebar, is really surprising: "In contrast, public keys
>allow the overt publication of an encryption key, because decryption keys
>can only be derived through a mathematically difficult process, such as
>large prime-number factoring. Contrary to popular belief, the NSA can
>decrypt public keys of most practical key sizes." I wonder what this
>means? If it is a claim that the NSA can factor 1024 bit moduli that
>would certainly come as a big surprise. If they are saying that they can
>do 512 bits that would be more believable although of interest. It is
>strange that the author would include a statement like this without
>attribution or evidence.
Another quote from the article posted elsewhere said that, "PGP, which is
based on the Diffie-Hellman public-key technology developed in the 1970s..."
This is technically true, since all public-key work (including RSA) is based
to some extent on DH. It could be, however, that the author is confusing
public-key technology with Diffie-Hellman public-key in particular, which
(as I understand it) is not particularly secure.