-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 01/12/2015 07:29 PM, Rich Freeman wrote:
> On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand
> <k...@gentoo.org> wrote:
>> 
>> One issue with DSA/ElGamal is the requirement for a random k
>> value while signing/encrypting,
> 
> Thanks - that was very informative.  I guess the thing that makes
> me more concerned about RSA is that Shor's algorithm makes it
> quite possible that it will be defeated at some point in the
> future, perhaps without public disclosure.

Shor's would be effective against discrete logs (including ECC) as
well, so wouldn't be applicable to this selection. For post-quantum
asymmetric crypto we'd likely need e.g a lattice based primitive.

- -- 
Kristian Fiskerstrand
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-----BEGIN PGP SIGNATURE-----
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=yIog
-----END PGP SIGNATURE-----

Reply via email to