
Agreed, There are a lot of very valid points in Dean's first post. No point in having a 4096bit key if it ends up on a flash drive dropped out of a laptop bag on Lambton quay -- Tristram Cheer Network Architect Tel. 09 438 5472 Ext 803 | Mobile. 022 412 1985 Fax. | tristram.cheer(a)ubergroup.co.nz | www.ubergroup.co.nz PS: Follow us on facebook: www.ubergroup.co.nz/fb or twitter https://twitter.com/#!/ubergroupltd -----Original Message----- From: nznog-bounces(a)list.waikato.ac.nz [mailto:nznog-bounces(a)list.waikato.ac.nz] On Behalf Of Hamish MacEwan Sent: Friday, 10 June 2011 9:03 a.m. To: Dean Pemberton Cc: nznog(a)list.waikato.ac.nz Subject: Re: [nznog] I don't trust the NZRS DNSSEC procedures... Yet On Fri, Jun 10, 2011 at 06:57, Dean Pemberton <nznog(a)deanpemberton.com> wrote:
Please don't confuse discussing key length with being solely focussed on it.
I think the way the discussion, temporarily, narrowed on an easily compared numeric issue, is testament to the lure of simple comparisons and drives the perception/political side of the argument. Even we are not immune to the siren call. One other point, if "someone announced today that they could factor a 1024 bit key in just 1 second" it would not be the result of Moore's Law, and clearly illustrates the speaker is not "under the impression that advances in cryptographic key breaking only ever proceed at a linear pace."
Dean
Hamish. -- http://tr.im/HKM _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog