The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.
Can anyone help me out. I have someone that is telling me they work for the US Govt and they are looking at stuff using 1000 bit encryption. Now...that just doesn't sound right to me at all Please...someone help me and prove me wrong and tell me that something like that is true. I've never heard of a "1000 bit encryption" and I am having a hard time finding anything on google about it.
The length of the bit just refers to the size of the key that creates the actual encryption. Yes, there is such a thing as 1024-bit encryption but seeing as how the US government uses 192 / 256 bit encryption for it's top secret data I don't think it's used often..
As of 2005, the largest number factored by a general-purpose factoring algorithm was 663 bits long, using a state-of-the-art distributed implementation. RSA keys are typically 1024–2048 bits long. Some experts believe that 1024-bit keys may become breakable in the near term (though this is disputed); few see any way that 4096-bit keys could be broken in the foreseeable future. Therefore, it is generally presumed that RSA is secure if n is sufficiently large. If n is 256 bits or shorter, it can be factored in a few hours on a personal computer, using software already freely available. If n is 512 bits or shorter, it can be factored by several hundred computers as of 1999. A theoretical hardware device named TWIRL and described by Shamir and Tromer in 2003 called into question the security of 1024 bit keys. It is currently recommended that n be at least 2048 bits long.
Iw as thinking that it would be 1024 as well, but they were referring to it as 1000 bit encryption. They are working for the US Govt and bypassing all their security measures to be in a chat room on my website
Finally, you're not allowed to ask for tips on circumventing your campus/office network security. It's a bad idea, don't do it, just go through the regular channels. For similar reasons, discussions of proxy servers and web anonymizers are also forbidden.
Man, I think this includes asking the forum to help someone else. Please read the rules and don't drag us into this.
Finally, you're not allowed to ask for tips on circumventing your campus/office network security. It's a bad idea, don't do it, just go through the regular channels. For similar reasons, discussions of proxy servers and web anonymizers are also forbidden.
Man, I think this includes asking the forum to help someone else. Please read the rules and don't drag us into this.
huh? wtf you talking about?
I'm not asking for anything like this...I'm merely pointing out the stupidity of some people and looking for your advice on whether or not this person is a lying tool, which it appears that they are Noone is asking about how to use proxies or avoidance or anything. Read the thread man.
Posts
Read up: http://en.wikipedia.org/wiki/Key_size
http://en.wikipedia.org/wiki/RSA
As of 2005, the largest number factored by a general-purpose factoring algorithm was 663 bits long, using a state-of-the-art distributed implementation. RSA keys are typically 1024–2048 bits long. Some experts believe that 1024-bit keys may become breakable in the near term (though this is disputed); few see any way that 4096-bit keys could be broken in the foreseeable future. Therefore, it is generally presumed that RSA is secure if n is sufficiently large. If n is 256 bits or shorter, it can be factored in a few hours on a personal computer, using software already freely available. If n is 512 bits or shorter, it can be factored by several hundred computers as of 1999. A theoretical hardware device named TWIRL and described by Shamir and Tromer in 2003 called into question the security of 1024 bit keys. It is currently recommended that n be at least 2048 bits long.
Here's a wiki article on Key Size for encryption:
http://en.wikipedia.org/wiki/Key_size
Edit: Beated by a country mile.
Standard Site to Site encryptions using IPSEC typically use 768bit, 1024bit, or 1536bit keys as a part of each proposal phase.
Man, I think this includes asking the forum to help someone else. Please read the rules and don't drag us into this.
I'm not asking for anything like this...I'm merely pointing out the stupidity of some people and looking for your advice on whether or not this person is a lying tool, which it appears that they are Noone is asking about how to use proxies or avoidance or anything. Read the thread man.
Work proxies are usually programs that completley block access to certain sites -- not hide them behind a wall of encyption..