of zeros before the first non-zero digit.
I get 2^15 / 2^271 = 1 / 2^256 which is a lot less impressive than your figure
but still a very small probability.
Sincerely,
--
Mathias Brossard
begin:vcard
fn:Mathias Brossard
n:Brossard;Mathias
org:OpenTrust;R&D
email;internet:[EMAIL PROT
nSSL files with URLs like
ftp://ftp.openssl.org/snapshot/openssl-0.9.8-fips-test-SNAP-.tar.gz
I was wondering if those are snapshots of the future FIPS 1.2 ?
Sincerely,
--
Mathias Brossard
begin:vcard
fn:Mathias Brossard
n:Brossard;Mathias
org:OpenTrust;R&D
email;internet:[EMAIL PROTECTED
That's not the
case with hardware offloading (and that's the point :P).
Sincerely,
--
Mathias Brossard
__
OpenSSL Project http://www.openssl.org
User Support
Am i missing
> some needed steps?
Launch openssl with 'time openssl speed rsa...' to see how much CPU is
used. That in turn should tell you if the hardware is actually
offloading the crypto.
Sincerely,
--
Mathias Brossard
ssl.org/docs.html). If GPL is an
issue for your work, you can buy a licence from them. Or from other
proprietary editors: Mocana (http://www.mocana.com/ssl.html), Spyrus
(http://www.spyrus.com/content/products/DeviceSSL_N7.asp), etc...
Sincerely,
--
Mathias Brossard <[EMAIL PROTECTED]&
e/rt2/Ticket/Display.html?id=569
Sincerely,
--
Mathias Brossard <[EMAIL PROTECTED]>
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL
tml)
To compute x = sqrt(n) iterate (until it converges):
x[i+1] = (x[i]+n/x[i])/2
Nota:
- You shouldn't use this when doing modular calculus you won't get the
real roots.
- In integer, it will round by truncation.
Sincerely,
--
Mathias
On Fri, 2003-09-05 at 19:59, Ben Laurie wrote:
> Mathias Brossard wrote:
> > - Asymmetric: DSA, RSA, ECDSA
>
> Not my understanding. Anyway, DSS only. RSA can't be, and ECDSA we
> aren't doing.
It's a little disappointing that RSA is not part of the pro
; should be
approximately:
- Symmetric: AES, DES, 3DES, Skipjack
- Asymmetric: DSA, RSA, ECDSA
- Message Authentication: DES MAC, Triple DES MAC
- Hash: SHA-1
- Keyed Hash: HMAC
- RNG: FIPS 186-2 (Appendix 3.1 & 3.2), ANSI X9.31 and ANS