Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: tanaka

Whence comes your confidence that the government has either a publicly unknown factoring algorithm on classical computers, or a quantum computer with enough q-bits (and well enough shielded from thermal background that the state doesn’t decohere) to implement Schor’s algorithm?

Short of that RSA, used as a key exchange method for a strong private key method, provides quite adequate security against NSA attack. (I like sending RSA encrypted keys better than Diffie-Hellman, but that’s just me.)

I teach RSA, El Gamal and Diffie-Hellman about once every three years in a short-course on cryptology. I beg to differ, but the algorithms are all trivial
to implement. The only impediment to their use might be finding a enough
100 to 200 digit primes, but again, a competent programmer with a good knowledge of number theory should have no problem.


20 posted on 02/04/2008 4:43:04 PM PST by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know. . .)
[ Post Reply | Private Reply | To 14 | View Replies ]


To: The_Reader_David

ok, I trust you. I’m more a patent expert than security expert.


23 posted on 02/04/2008 4:52:11 PM PST by tanaka
[ Post Reply | Private Reply | To 20 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson