| Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Anthony Gabrielson <agabrielpop at home.tzo.org> writes:
> ...If I really do want privacy then I need to find an encryption
> algorithm I trust, unfortunately if they want to crack that they
> still can as a function clock cycles.
If you're careful, decryption should not just be a matter of cycles.
It should only be possible:
- if the key is guessable. If the key is short enough then
decryption is indeed just a matter of cycles. So use a long key.
- if the encryption algorithm has a weakness. This may be discovered
at any time. A short key by design (e.g. DES) qualifies as a
weakness.
- circa 2015 (or whenever quantum computers come online) if you use a
public key cryptosystem. So use single-key encryption for your
personal journal.
- Jim Van Zandt