![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Anthony Gabrielson <agabrielpop at home.tzo.org> writes: > ...If I really do want privacy then I need to find an encryption > algorithm I trust, unfortunately if they want to crack that they > still can as a function clock cycles. If you're careful, decryption should not just be a matter of cycles. It should only be possible: - if the key is guessable. If the key is short enough then decryption is indeed just a matter of cycles. So use a long key. - if the encryption algorithm has a weakness. This may be discovered at any time. A short key by design (e.g. DES) qualifies as a weakness. - circa 2015 (or whenever quantum computers come online) if you use a public key cryptosystem. So use single-key encryption for your personal journal. - Jim Van Zandt
![]() |
|
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |