-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 01/12/2015 07:29 PM, Rich Freeman wrote: > On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand > <k...@gentoo.org> wrote: >> >> One issue with DSA/ElGamal is the requirement for a random k >> value while signing/encrypting, > > Thanks - that was very informative. I guess the thing that makes > me more concerned about RSA is that Shor's algorithm makes it > quite possible that it will be defeated at some point in the > future, perhaps without public disclosure.
Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. - -- Kristian Fiskerstrand Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUtBYdAAoJEPw7F94F4TagA0cP/1fUOfyn+goHBJUPsrqNBt72 tkEShCRRtdqwknPf5XYR5oM3jRpG9QZ4L89vjXC/3SklIT1wz+IFLkUgJHbfg33k rbmr6oMXbQaqHami3l646DMjoqItLl1Nlnd5sqTVSBEB16KiJGE3oCVTAX6KisFW 72chafJh+4x9Cbbt48PL1FjCiLDunokCOHPtbXthkL2NJaPnIJh7HHCQk2CtgFZX tER2gXai7VsQMMQdO9VuwNvrFS1svWFK97Eba1xgQx7tMg4hxWJadQphlwMKMEj+ uvZZ0HE708AUYBah+VCNJRFbJpyoND+7prUR19MnleUfehLWZHNUaOc1G8PK8X2b GhH6fe2wft05e8jrfMgV0acECqdvsb82zvfYQRVksQbtxdhTB3ObPcBLYveG6tQU IKLv47imTGAIW+Hwqk7EYQpLAMCcNhLmnwOdIe3CT+pvnluiGKZ55O67DJvE5QPS goPkh8nmSRIcLdCYyJxU0X+nODQLUNi0sb1b8ryKM1OLz2jSq2vhehet0jZ8vu2T 0FpHKKo0dK7QTQQMmaoQ4Opfe3fff3kROhq3o0h6XMEg6niyzObg87ULecqKq59w CfeYHq6RIKnc3Yfn0flzcAlKXVlW+dpcHS1hXHiaLrO6iVtvtfZxBG4mAUZuqWyi k4FfOwRIvhFN5nTvM/TF =yIog -----END PGP SIGNATURE-----