<div dir="ltr">From <font color="#000000" style="padding:0px;margin:0px;border-collapse:collapse;font-family:arial,sans-serif;line-height:15px;background-repeat:no-repeat no-repeat"><a class="" rel="author" href="http://www.theguardian.com/profile/bruceschneier" style="padding:0px;margin:0px;border-collapse:collapse;font-family:arial,sans-serif;line-height:15px;background-repeat:no-repeat no-repeat">Schneier</a>'s</font> Guardian article today: <a href="http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance">http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance</a><div>
<br></div><div><p style="padding:0px;margin:0px 0px 13px;border-collapse:collapse;font-family:arial,sans-serif;color:rgb(51,51,51);font-size:14px;line-height:18px;background-repeat:no-repeat no-repeat">>Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.</p>
</div><div>I'm ignorant of the inner working of <font color="#333333" face="arial, sans-serif"><span style="line-height:18px">elliptic-curve systems. Obviously Bruce is an authority, but is he right here? Are the older algorithms safer from NSA evesdropping?</span></font></div>
<div><br></div><div><br></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Aug 29, 2013 at 3:05 AM, idMac <span dir="ltr"><<a href="mailto:idmac@free.fr" target="_blank">idmac@free.fr</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Thank you, I'll search where I read it !<br>
<div class="HOEnZb"><div class="h5"><br>
<br>
> On 28 août 2013, at 14:38, Okan Demirmen <<a href="mailto:okan@demirmen.com">okan@demirmen.com</a>> wrote:<br>
><br>
>> On Wed, Aug 28, 2013 at 7:57 AM, idMac <<a href="mailto:idmac@free.fr">idmac@free.fr</a>> wrote:<br>
>> Hi All,<br>
>><br>
>> I know it's not enough but it could be 'one more edge' to improve secured<br>
>> access, it's the yubikey.<br>
>> Or just a usb stick transformed to be used with pamusb lib.<br>
><br>
> Yes, I totally agree, especially with yubikey.<br>
><br>
>> Another thing, ECDSA is better than RSA until size is lower than 1024 or<br>
>> 2048 bits I read. (But I would have confirmation/infirmation of it)<br>
>> For example, RSA key with more than 4096 could be stronger than ECDSA key<br>
>> with 4096 bits.<br>
>><br>
>> Is it true ?<br>
><br>
> I won't post potentially mis-information, and leave it to someone<br>
> else...archives are a killer :)<br>
><br>
>> Thank you,<br>
>> Julien<br>
>><br>
>> On 28 Aug, 2013, at 4:07 AM, George Rosamond <<a href="mailto:george@ceetonetechnology.com">george@ceetonetechnology.com</a>><br>
>> wrote:<br>
>><br>
>> Okan Demirmen:<br>
>><br>
>> On Tue, Aug 27, 2013 at 9:50 PM, George Rosamond<br>
>> <<a href="mailto:george@ceetonetechnology.com">george@ceetonetechnology.com</a>> wrote:<br>
>><br>
>> Okan Demirmen:<br>
>><br>
>> On Tue, Aug 27, 2013 at 7:24 PM, George Rosamond<br>
>> <<a href="mailto:george@ceetonetechnology.com">george@ceetonetechnology.com</a>> wrote:<br>
>><br>
>> Okan Demirmen:<br>
>><br>
>> On Wed, Aug 7, 2013 at 9:58 AM, Isaac (.ike) Levy<br>
>> <<a href="mailto:ike@blackskyresearch.net">ike@blackskyresearch.net</a>> wrote:<br>
>><br>
>><br>
>> Hi All,<br>
>><br>
>> I'd love to know what people's thoughts are on the state of older<br>
>> RSA/DSA encryption, versus the future of eliptic curve ECDSA:<br>
>><br>
>> <a href="http://www.technologyreview.com/news/517781/math-advances-raise-the-prospect-of-an-internet-security-crisis/" target="_blank">http://www.technologyreview.com/news/517781/math-advances-raise-the-prospect-of-an-internet-security-crisis/</a><br>
>><br>
>> --<br>
>> A few years ago, a number of us were wary of the brand-spankin'-new ECC<br>
>> crypto for use in SSH public keys. And then months later, there were<br>
>> some ECDSA/ssh implementation problems exposed:<br>
>><br>
>> <a href="http://marc.info/?l=openssh-unix-dev&m=130613765816780&w=2" target="_blank">http://marc.info/?l=openssh-unix-dev&m=130613765816780&w=2</a><br>
>><br>
>> So, that was 2 years ago, ECDSA implementations are now no longer in<br>
>> their infancy.<br>
>><br>
>> --<br>
>> What are people's thoughts on the practicality of starting to use ECDSA<br>
>> keys?<br>
>><br>
>> Has anyone here seen their use mandated over RSA/DSA in a business setting?<br>
>> Has anyone just jumped into ECDSA bliss, and not looked back?<br>
>><br>
>><br>
>> Not that this might mean much, but I use them.<br>
>><br>
>> As for policies in a business setting; I gather such technical<br>
>> policies are made by people like you, so it's likely up to what folks<br>
>> like you write in said policies :)<br>
>><br>
>><br>
>> So I'm in the process of getting a client to pickup better practices<br>
>> with SSH, and found out even OSX 10.7.5 doesn't support ecdsa.<br>
>><br>
>> AFAIK, Putty doesn't either yet, and I doubt SSH for Windows does either.<br>
>><br>
>><br>
>> So many things there just blew my mind...but OK, I'll mend myself later :)<br>
>><br>
>> I'd simply recommend to them to start using keys, regardless of type -<br>
>> get them in the habit, and whenever these other tools get support for<br>
>> the new fangle stuff, just add to authorized keys and migrate. Just<br>
>> get them in the habit of thinking about keys instead. I'm sure you<br>
>> know all this....<br>
>><br>
>><br>
>> Like most of the sane world, they are using keys.. with passwds. I'm<br>
>> going the next step.<br>
>><br>
>><br>
>> I figured. So here's my issue, and you can call it a double-edged<br>
>> sword if you want - one is storing private keys on client that lives<br>
>> in an extremely hostile environment - that is the vector that needs to<br>
>> be addressed. Sure, remove keys and use passwords instead - then<br>
>> we're back to that debate.<br>
>><br>
>> Double-edged? Maybe, but think about the use-case and attack vectors -<br>
>> that's all I'm saying.<br>
>><br>
>><br>
>> So this would be much easier if we could have IRC synchronized with<br>
>> talk@ ;) (efnet #nycbug)<br>
>><br>
>> Security and its related fields are often relative, and dependent upon<br>
>> adversaries in question. And part of the relative and cumulative issue<br>
>> is with user behavior.<br>
>><br>
>> Don't require a strict security policy on passwds and 12 other things<br>
>> overnight. Once they figure out how to create and remember multiple<br>
>> long passwds, then you build off that, for instance. So you have them<br>
>> comfortably using SSH, then keys. And keys with passwds doesn't seem so<br>
>> initimidating.<br>
>><br>
>> g<br>
>><br>
>> _______________________________________________<br>
>> talk mailing list<br>
>> <a href="mailto:talk@lists.nycbug.org">talk@lists.nycbug.org</a><br>
>> <a href="http://lists.nycbug.org/mailman/listinfo/talk" target="_blank">http://lists.nycbug.org/mailman/listinfo/talk</a><br>
>><br>
>><br>
>><br>
>> _______________________________________________<br>
>> talk mailing list<br>
>> <a href="mailto:talk@lists.nycbug.org">talk@lists.nycbug.org</a><br>
>> <a href="http://lists.nycbug.org/mailman/listinfo/talk" target="_blank">http://lists.nycbug.org/mailman/listinfo/talk</a><br>
>><br>
<br>
_______________________________________________<br>
talk mailing list<br>
<a href="mailto:talk@lists.nycbug.org">talk@lists.nycbug.org</a><br>
<a href="http://lists.nycbug.org/mailman/listinfo/talk" target="_blank">http://lists.nycbug.org/mailman/listinfo/talk</a><br>
</div></div></blockquote></div><br></div>