key generation: paranoia mode - explicit random input

Hauke Laging mailinglisten at hauke-laging.de
Fri Feb 28 16:05:55 CET 2014


Am Do 27.02.2014, 22:30:01 schrieb Robert J. Hansen:
> > Trivial to prevent in comparison to the task of verifying a distro.
> 
> There are literally thousands of vectors.  Defending against *all* of
> them is a deeply nontrivial task.

As usual I can agree only.

But what does that mean in practice? Does that mean we don't aim for 
improvements any more, not even those which are easy to implement?

Why are we talking about something like SHA-3 at all if "all is lost to 
THEM" anyway? (Please note that I am not implying this was your 
attitude.)

Besides the obvious development resource limit I guess the point should 
be: How much more security would one get from a certain action and how 
much effort would it be?


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20140228/41179725/attachment.sig>


More information about the Gnupg-users mailing list