My personal email provider (see below) just recently supported ed25519 for 
users public/private key pairs. They still support RSA keys of course.

Mark Jacobs


Sent from ProtonMail, Swiss-based encrypted email.

GPG Public Key - 
https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Tuesday, August 27, 2019 12:40 PM, Kirk Wolf <k...@wolf-associates.com> 
wrote:

> Keeping with ibm-main tradition, I'll steer this into a different ditch :-)
>
> "Seriously, stop using RSA"
> This is a very interesting writeup/presentation, I've shorted the URL for
> obvious reasons
> https://tinyurl.com/yxw5xvmv
>
> IMO, ECDSA (NIST curves) are much better than RSA, although researchers
> seem to prefer Curve25519 since the curve wasn't chosen by a government.
>
> On Tue, Aug 27, 2019 at 7:56 AM Chad Rikansrud <
> mainfr...@bigendiansmalls.com> wrote:
>
> > " Non-repudiation for the message is not guaranteed by a hash. There is
> > more than 1 message that could match that hash. "
> > The breadth of privacy on the internet as we know it depends upon being
> > able to trust that a hashing algo + cryptographic signature verifies the
> > non-repudiation of the sender.
> > Couple other items on this thread:
> > it's true are an infinite number of inputs that would generate any given
> > hash, and random inputs can and have created general hash collisions (md5
> > for instance has known random input that creates identical hashes),
> > however, creating a meaningful input that (say in this case would be
> > similar to what someone would want to say & sign, but slightly different so
> > as to alter the message) - is cryptographically infeasible with today's
> > compute power / hashes. Great article explaining collisions etc (
> > https://www.sciencedirect.com/topics/computer-science/hash-collision)
> > For RSA public key systems - there is only 1 private key for any given
> > public key. The keypairs certainly can and have been reused - that all
> > depends on how good your entropy in choosing random numbers is (see
> > https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html
> > )
> > There's no requirement outside of p & q being prime (In RSA) , that the
> > public exponent or its related private exponent need not be prime, only
> > co-prime (having no factors in common) - as was mentioned earlier. That
> > said, one of the most common public exponent is prime (65537)
> > All in all, to the original point though, sharing the private key by that
> > vendor was terrible - you could effectively impersonate them in any / all
> > situations that used that keypair/cert if you had a privileged position or
> > means. Yikes.
> > Chad
> >
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
>
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to