[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] How the NSA breaks Diffie-Hellmann



Are curve25519 and ed25519 assumed "secure"? Both are not included in
cookie cutter crypto libraries like openssl, hence less applications
using them. I don't know how to feel about algorithms only used in
OpenSSH, Tor, i2p and GNUnet.

LluÃs wrote:
> Pretty reassuring and comforting. :))
> 
> LluÃs
> 
> Nick Mathewson:
>> On Tue, Oct 20, 2015 at 4:52 AM, LluÃs <2015.msl@xxxxxxxxx> wrote:
>>> I understand, from a post to this list, than tor is switching from RSA
>>> to elliptic curve key generation.
>>>
>>> What would we expect from that update ?
>>>
>>
>> For encryption, it already happened back in 0.2.4, with the
>> introduction of the ntor protocol.  (And with the use of ecdhe in tls
>> where available.)
>>
>> The remaining use of RSA is for authentication, and should be mostly
>> phased out over the next 8 months.
>>
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk