Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Message-ID: <3F6AF46A.7070107@fillmore-labs.com> Date: Fri, 19 Sep 2003 14:19:54 +0200 From: Patrick Eisenacher MIME-Version: 1.0 To: cygwin AT cygwin DOT com Subject: Re: ssh-keygen and slogin oddity Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated-Sender: eisenacher AT fillmore-labs DOT com User-Agent: KMail/1.5.9 Organization: Fillmore Labs GmbH X-Complaints-To: abuse AT fillmore-labs DOT com Corinna, do you have any reference for this? Unless this is something inherent in the ssh protocol or its implementation, which I'm not familiar with, I'm not aware that crypto systems based on discrete logarithms (DSA) are less secure than those based on factoring large integers (RSA). FWIW: - RSA verifies much faster than DSA, whereas DSA signs faster than RSA - RSA can also be used for en-/decryption, whereas DSA can not - RSA was patented in the USA, but the patent ran out in the meantime - strong encryption crypto (eg RSA) was export restricted from the US, but this restriction was deregulated Patrick Corinna Vinschen schrieb: [snip] > Another btw., don't use DSA if you can avoid it. Create your own > RSA ssh2 key with ssh-keygen -t rsa. It's supposed to be more secure > than DSA keys. > -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Problem reports: http://cygwin.com/problems.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/