Agreed, There are a lot of very valid points in Dean's first post. No point in having a 4096bit key if it ends up on a flash drive dropped out of a laptop bag on Lambton quay
--
Tristram Cheer
Network Architect
Tel. 09 438 5472 Ext 803 | Mobile. 022 412 1985
Fax. | tristram.cheer(a)ubergroup.co.nz | www.ubergroup.co.nz
PS: Follow us on facebook: www.ubergroup.co.nz/fb or twitter https://twitter.com/#!/ubergroupltd
-----Original Message-----
From: nznog-bounces(a)list.waikato.ac.nz [mailto:nznog-bounces(a)list.waikato.ac.nz] On Behalf Of Hamish MacEwan
Sent: Friday, 10 June 2011 9:03 a.m.
To: Dean Pemberton
Cc: nznog(a)list.waikato.ac.nz
Subject: Re: [nznog] I don't trust the NZRS DNSSEC procedures... Yet
On Fri, Jun 10, 2011 at 06:57, Dean Pemberton
Please don't confuse discussing key length with being solely focussed on it.
I think the way the discussion, temporarily, narrowed on an easily compared numeric issue, is testament to the lure of simple comparisons and drives the perception/political side of the argument. Even we are not immune to the siren call. One other point, if "someone announced today that they could factor a 1024 bit key in just 1 second" it would not be the result of Moore's Law, and clearly illustrates the speaker is not "under the impression that advances in cryptographic key breaking only ever proceed at a linear pace."
Dean
Hamish. -- http://tr.im/HKM _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog