
6 Jul
2018
6 Jul
'18
2:40 a.m.
The D/H is going to be used just to generate a key to securely transfer a 4096 bit key for use in symmetrical crypto routines later in the program,
You want to use a 4096-bit key for SYMMETRICAL crypto? Hello? Not only I don't know of ANY symmetrical algorithm with such a key, but why on Earth would you need it for? What attack do you know against a 128-bit or even 256-bit key that doesn't work against a 4096-bit one?
What symmetric crypto algorithm is that?
Did I mention that I wrote a Yarrow implementation in Delphi? <g> It passes DIEHARD, but it hasn't been otherwise checked. [Public domain, btw.]
I like this guy :) [All my code is public domain, but I hate the GPL for *forcing* people to share. Communism at its best.] Mark
2526
Age (days ago)
2526
Last active (days ago)
0 comments
1 participants
participants (1)
-
Asymmetric