SafeCurves: choosing safe curves for elliptic-curve cryptography

Discussion in 'privacy technology' started by BoerenkoolMetWorst, Jun 6, 2014.

Thread Status:
Not open for further replies.
  1. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Dec 22, 2009
    Outer space
  2. BeardyFace

    BeardyFace Registered Member

    May 29, 2014
    ECC is so easy to do wrong, one wonders if it didn't need more study before folks rushed to use it, it's not like the alternative is broken.
  3. brians08

    brians08 Registered Member

    Apr 27, 2008
    All crypto is easy to do wrong. If the SafeCurves site is proven correct, the SSL curves will be replaced.
    Also, RSA is not exatly broken but many think the NSA can decrypt it without too much effort if they want to.
  4. blainefry

    blainefry Registered Member

    Jan 25, 2014
    I'd say it depends on what "too much effort" is. Sure they've got a budget and computing power, and sure there's a lot of ≤1024 RSA out there, and sure, maybe they even had a breakthrough and have some method for factoring that the rest of the world doesn't know about...but math is math.

    That's one of the main things I keep hearing out of the Snowden revelations is basically that the NSA is not magic, and they're bound my the same laws of math and physics that the rest of the world is.

    If you want to say they could probably decrypt your specific message if they really wanted to, sure, maybe. (If it's asymmetric). But they're collecting billions upon billions of communications every single day. Not even the NSA has the resources to sift through all that, let alone decrypt everything that's encrypted.

    Bump your keys up to 4096 (or at least 2048 ), and you should be okay (unless you personally are worth a considerable amount of time and millions of dollars to the spooks.)

    In that case, watch out for cell phones nearby...
Thread Status:
Not open for further replies.