[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: xxx-draft-spec-for-TLS-normalization.txt
- To: or-dev@xxxxxxxxxxxxx
- Subject: Re: xxx-draft-spec-for-TLS-normalization.txt
- From: Mansour Moufid <mansourmoufid@xxxxxxxxx>
- Date: Mon, 31 Jan 2011 00:01:34 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-dev-outgoing@xxxxxxxx
- Delivered-to: or-dev@xxxxxxxx
- Delivery-date: Mon, 31 Jan 2011 00:02:01 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:content-type; bh=kx+vais9mrs+Ni4SV1RHM0iFgPgpY96phXujjbIPHyc=; b=AHvoNqgsiwI+NjQqFbcgVrNZSWxwUvbXFK+BN4HSXwK3dh8HiHzcm/pADd5eNjl87g PXs+GmLAWNLpJi+mCsgpUazuCo19r1iyCuSsJ9cIdQ1OW6OHiyup9c0Ma1QTvqFkk3u6 ept+HhNxMqULIKOIS5P6V+W/af9jqXtyB5F38=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; b=FQqR9By8liF8JukEncc+R2mDSAPVjBj3FUcrSniLflom2snu5uYdh3b792ZbXMkhR/ 5iTBJAV7pKpfovDO94pj+/r+nGlK2eyyRidws93NLjL3+W7L2s3f2bcFqHYYCgPPzUPt FTnA3qSc/ro3dui6X+wNOLaZ5iAwmMZL3NjM4=
- In-reply-to: <87sjwebrvu.fsf@xxxxxxxxxx>
- References: <4D409534.3080302@xxxxxxxxxxxxx> <87sjwebrvu.fsf@xxxxxxxxxx>
- Reply-to: or-dev@xxxxxxxxxxxxx
- Sender: owner-or-dev@xxxxxxxxxxxxx
On Thu, Jan 27, 2011 at 4:47 AM, George Kadianakis <desnacked@xxxxxxxxx> wrote:
> The problem with AKS - and the reason it's not used in real life
> applications - is it's terrible performance when in contrast with all
> the other probabilistic primality tests [4].
Thanks for the info, an excellent read. In that case, might as well
borrow from OpenSSH, it's all done in moduli.c. There are also some
groups in RFC 3526 that could be useful.