Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-21 Thread aka
Are curve25519 and ed25519 assumed "secure"? Both are not included in cookie cutter crypto libraries like openssl, hence less applications using them. I don't know how to feel about algorithms only used in OpenSSH, Tor, i2p and GNUnet. Lluís wrote: > Pretty reassuring and comforting. :)) > > Lluí

Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread Lluís
Pretty reassuring and comforting. :)) Lluís Nick Mathewson: > On Tue, Oct 20, 2015 at 4:52 AM, Lluís <2015@gmail.com> wrote: >> I understand, from a post to this list, than tor is switching from RSA >> to elliptic curve key generation. >> >> What would we expect from that update ? >> > > For

Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread Nick Mathewson
On Tue, Oct 20, 2015 at 4:52 AM, Lluís <2015@gmail.com> wrote: > I understand, from a post to this list, than tor is switching from RSA > to elliptic curve key generation. > > What would we expect from that update ? > For encryption, it already happened back in 0.2.4, with the introduction of

Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread karsten . n
Hi, > I guess quite a lot which makes me wondering whether this could be a >feature for the level "High" on the security slider. I would recommend it for the "Medium High" level too, because I think, this level works almost good for users with high security requirements. (See recommendatio

Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread Georg Koppen
karste...@mailbox.org: > An other more advanced solution for TorBrowser would be possible. You can > increase the min. length for DH parameter to 2048 bit in NSS lib. Min. > length for DH parameter was set to 1024 in NSS 3.19.1 to avoid Logjam > attack. May be, it is time to increase it to 20148 bi

Re: [tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread Lluís
I understand, from a post to this list, than tor is switching from RSA to elliptic curve key generation. What would we expect from that update ? Thanks for everyone's effort Lluís karste...@mailbox.org: > Hello, > > the paper "How is NSA breaking so much crypto?" got the Best Paper Award > at

[tor-talk] How the NSA breaks Diffie-Hellmann

2015-10-20 Thread karsten . n
Hello, the paper "How is NSA breaking so much crypto?" got the Best Paper Award at ACM CCS im Oct. 2015. https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-much-crypto/ Diffie-Hellman is a cornerstone of modern cryptography used for VPNs, HTTPS websites, email, and many