Re: [tor-dev] Subject: Re: The consequences of key compromise (or the reasons for changing)

2011-11-04 Thread Jon Callas
On Nov 4, 2011, at 12:14 AM, Markku-Juhani O. Saarinen wrote: > > From: Jon Callas > >> People should get off of 80-bit crypto as soon as is reasonably possible. >> This means RSA 1024, SHA-1, etc. NIST recommended doing this by the end of >> 2010, but are now ho

Re: [tor-dev] The consequences of key compromise (or the reasons for changing)

2011-11-03 Thread Jon Callas
On Nov 3, 2011, at 9:08 PM, Watson Ladd wrote: > Dear all, > > Recently Zooko forwarded an email asking why we have to migrate. I am > outlining the reasons in this email why I believe Tor needs to > use stronger cryptography very soon. > > Tor currently uses RSA-1024 bit keys for OR public ide

Re: [tor-dev] SHA-3 isn't looking so hot to me

2011-11-03 Thread Jon Callas
Zooko forwarded a hash question over to the SHA-3 competition mailing list, and mentioned the discussion that has been going on here. He's going to forward over comments that I made and John Kelsey made. Nonetheless, I'd like to offer some comments on what I've read in a larger context. I don't