Sujet : Re: Torvalds Slams Theoretical Security
De : invalid (at) *nospam* invalid.invalid (Richard Kettlewell)
Groupes : comp.os.linux.advocacy comp.os.linux.miscDate : 24. Oct 2024, 18:48:57
Autres entêtes
Organisation : terraraq NNTP server
Message-ID : <wwvv7xh1jee.fsf@LkoBDZeT.terraraq.uk>
References : 1 2 3 4
User-Agent : Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Lawrence D'Oliveiro <
ldo@nz.invalid> writes:
Richard Kettlewell wrote:
The obvious answer is attacks on weak cryptography. RSA-1024 and DH-1024
are probably breakable by the biggest SIGINT agencies (and anyone else
with comparable compute resources: cloud service providers for example).
>
Weak cryptography is easy to fix. The hard part to fix is weak random
numbers.
Other way round. A bad RNG can be swapped out for a better one with
little or no impact on anything else. Cryptographic choices that are
baked into a protocol or API are a lot more challenging to shift.
-- https://www.greenend.org.uk/rjk/