[cryptography] Duplicate primes in lots of RSA moduli
James A. Donald
jamesd at echeque.com
Wed Feb 22 02:53:51 EST 2012
On 2012-02-22 12:31 PM, Kevin W. Wall wrote:
> 1) They think that key size is the paramount thing; the bigger the
> 2) The have no clue as to what cipher modes are. It's ECB by default.
> 3) More importantly, they don't know how to choose a cipher mode (not
> surprising, given #2). They need to understand the trade-offs.
> 4) They have no idea about how to generate keys, derived keys, IVs,
> 5) They don't know what padding is, or when/why to use it.
> 6) They have a very naive concept of entropy...where/when to use it
> and from where and how to obtain it.
The debian debacle was none of the above - the patch was simply
obviously stupid even if one had no idea about what the software was
supposed to be doing.
One poster claimed that left wing politics trumped competence, resulting
in idiots in charge. This seems plausible, since it was absurd to
introduce left wing politics into a linux distro. Since left wing
politics was introduced, those introducing it pretty much have to be morons.
As to why the Wifi consortium keeps getting it wrong time after time
after time, I do not know, but it was none of the above errors, and as
far as I know, I cannot blame the left for that lot.
More information about the cryptography