Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

15
  • 3
    @Ashwin - As D.W. said, asymmetric cryptography is roughly 10000 times slower/more CPU intensive than using a block cipher. So it makes sense to only transfer enough info to then use the much faster key. Commented Apr 11, 2012 at 14:30
  • 1
    RC4, not AES in this particular case, but past the particular symmetric algorithm used.. Commented Apr 12, 2012 at 12:54
  • 1
    @drjimbob not to mention key generation, we only use likely primes not guaranteed primes cause of that one :/ Commented Apr 12, 2012 at 12:55
  • 1
    @ewanm89 - Yes, we only use likely primes -- but with astronomical odds they actually are prime. With random entropy input the chance of getting a false positive prime in openssl with default settings is 1 in ~2^80 ~ 10^24 So until you check about ~10^23 numbers for primality with overwhelming odds you can assume your numbers are truly prime. E.g., if you check a billion potential primes a second, it will take ~10 million years before you are likely to have a false positive prime in your keypair. Edited for RC4/AES mixup. Commented Apr 12, 2012 at 15:23
  • 2
    factoring is not NP hard. It's just there is no known algorithm that can factor in polynomial time but AFAIK no one has proven it can't be done. en.wikipedia.org/wiki/Integer_factorization Commented Apr 13, 2012 at 2:02