Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm
List-Subscribe: <mailto:cygwin-subscribe@cygwin.com>
List-Archive: <http://sources.redhat.com/ml/cygwin/>
List-Post: <mailto:cygwin@cygwin.com>
List-Help: <mailto:cygwin-help@cygwin.com>, <http://sources.redhat.com/ml/#faqs>
Sender: cygwin-owner@cygwin.com
Mail-Followup-To: cygwin@cygwin.com
Delivered-To: mailing list cygwin@cygwin.com
Message-ID: <3F6AF46A.7070107@fillmore-labs.com>
Date: Fri, 19 Sep 2003 14:19:54 +0200
From: Patrick Eisenacher <eisenacher@fillmore-labs.com>
MIME-Version: 1.0
To: cygwin@cygwin.com
Subject: Re: ssh-keygen and slogin oddity
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
X-Authenticated-Sender: eisenacher@fillmore-labs.com
User-Agent: KMail/1.5.9
Organization: Fillmore Labs GmbH  <http://www.fillmore-labs.com/>
X-Complaints-To: abuse@fillmore-labs.com

Corinna,

do you have any reference for this?

Unless this is something inherent in the ssh protocol or its 
implementation, which I'm not familiar with, I'm not aware that crypto 
systems based on discrete logarithms (DSA) are less secure than those 
based on factoring large integers (RSA).

FWIW:
- RSA verifies much faster than DSA, whereas DSA signs faster than RSA
- RSA can also be used for en-/decryption, whereas DSA can not
- RSA was patented in the USA, but the patent ran out in the meantime
- strong encryption crypto (eg RSA) was export restricted from the US, 
but this restriction was deregulated


Patrick

Corinna Vinschen schrieb:
[snip]
> Another btw., don't use DSA if you can avoid it.  Create your own
> RSA ssh2 key with ssh-keygen -t rsa.  It's supposed to be more secure
> than DSA keys.
> 



--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

