B
Ban Hoang
subcribe
-----Original Message-----
From: Ban Hoang [mailto:[email protected]]=20
Sent: Monday, August 28, 2006 10:41 AM
To: ruby-talk ML
Subject: unsubcribe
unsubcribe
-----Original Message-----
From: snacktime [mailto:[email protected]]=20
Sent: Monday, August 28, 2006 10:32 AM
To: ruby-talk ML
Subject: Re: asymmetric encryption options
of the key. I think I will just stick with my current approach
though, as it seems to be the path of least resistance, and the
performance is acceptable.
-----Original Message-----
From: Ban Hoang [mailto:[email protected]]=20
Sent: Monday, August 28, 2006 10:41 AM
To: ruby-talk ML
Subject: unsubcribe
unsubcribe
-----Original Message-----
From: snacktime [mailto:[email protected]]=20
Sent: Monday, August 28, 2006 10:32 AM
To: ruby-talk ML
Subject: Re: asymmetric encryption options
The openssl implementation won't encrypt a block larger then the sizeWell, ElGamal (basically a variation on Diffie-Hellman key agreement),
but then again having implemented both ElG and RSA on various
platforms myself I don't see ElG as being significantly simpler than
RSA (both still require modular exponentiation of large numbers).
What's the big problem with RSA?
of the key. I think I will just stick with my current approach
though, as it seems to be the path of least resistance, and the
performance is acceptable.