Search:

Type: Posts; User: laserlight

Search: Search took 0.17 seconds.

  1. Replies
    16
    Views
    6,823

    Sounds like a misunderstanding. You were the...

    Sounds like a misunderstanding. You were the first one to mention public key cryptography in this thread. citizen's comments were directly concerning Junior89's algorithm.


    Please do not make...
  2. Replies
    16
    Views
    6,823

    No, we are talking about "modern cryptography"....

    No, we are talking about "modern cryptography". If you wanted to talk about public key encryption, then you should have said so, but Junior89's algorithm clearly is not public key cryptography.

    ...
  3. Replies
    16
    Views
    6,823

    Of course, there is the caveat of "current and...

    Of course, there is the caveat of "current and near future technology", otherwise quantum computing and the like would make "complexity theoretic" cryptography obsolete. In that sense, I would argue...
  4. Replies
    16
    Views
    6,823

    Would not such small primes become a weakness...

    Would not such small primes become a weakness (e.g., allowing brute force attacks)?


    I do not know if the U.S. government uses public key cryptography for more than things like key exchange, but...
  5. Replies
    16
    Views
    6,823

    That sounds more applicable to public...

    That sounds more applicable to public cryptography to me, where the keys would be more likely be 1024 bits or larger primes (or probable primes). For example, I think Twofish uses XOR quite...
Results 1 to 5 of 5