1994-08-13 - Re: POST:Gaining ISDN Privacy with data encryption

Header Data

From: Phil Karn <karn@qualcomm.com>
To: claborne@microcosm.sandiegoca.NCR.COM
Message Hash: 4c1ed2686586cd04629ec2a0a82fad724b94c540c6f8e5f3c099c867d3db8f70
Message ID: <199408130535.WAA03143@servo.qualcomm.com>
Reply To: <2E4BF2DC@microcosm.SanDiegoCA.NCR.COM>
UTC Datetime: 1994-08-13 05:34:44 UTC
Raw Date: Fri, 12 Aug 94 22:34:44 PDT

Raw message

From: Phil Karn <karn@qualcomm.com>
Date: Fri, 12 Aug 94 22:34:44 PDT
To: claborne@microcosm.sandiegoca.NCR.COM
Subject: Re: POST:Gaining ISDN Privacy with data encryption
In-Reply-To: <2E4BF2DC@microcosm.SanDiegoCA.NCR.COM>
Message-ID: <199408130535.WAA03143@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain


Looks like these guys haven't noticed that Diffie-Hellman was added to
RSAREF 2.0. Even with its highly suboptimum exponentiation code, I can
generate a 1K bit key in roughly 20 seconds on a 50 Mhz 486, assuming
precomputation of the first phase of the protocol (generating a random
number and exponentiating it). That's much faster than generating a
transient RSA key pair.

Phil





Thread