Mike Hearn [ARCHIVE] on Nostr: 📅 Original date posted:2014-03-21 📝 Original message:Maybe so, but given the ...
📅 Original date posted:2014-03-21
📝 Original message:Maybe so, but given the relatively minor advantages of ECC certs I can see
why a CA might not want to take any risks. They are sitting ducks for
patent trolls.
I think ECC will still happen, though we end up back into NSA fear
territory thanks to the stupid way secp256r1 was defined. *Hopefully* there's
no back door.
On Fri, Mar 21, 2014 at 1:25 PM, Adam Back <adam at cypherspace.org> wrote:
> According to Bernstein it's patent FUD (expired, ancient and solid prior
> art).
>
>
http://lists.randombit.net/pipermail/cryptography/2013-August/005126.html>
> Adam
>
>
> On Fri, Mar 21, 2014 at 12:33:57PM +0100, Mike Hearn wrote:
>
>> Oh, one other reason I found - apparently RIM, at least in the past,
>> has been telling CA's that they need to pay mad bux for the Certicom
>> ECC patents. So that's another reason why most certs are still using
>> RSA.
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140321/802d380b/attachment.html>
Published at
2023-06-07 15:14:23Event JSON
{
"id": "a729cd47ba2df6b35bcbb24cd3c66096cf4cd47290ff7838e6cd42bb1bacfcca",
"pubkey": "f2c95df3766562e3b96b79a0254881c59e8639f23987846961cf55412a77f6f2",
"created_at": 1686150863,
"kind": 1,
"tags": [
[
"e",
"d70d8d12a406cb1c9a067111bb9c717b35fd85b951e12f89e562fccc2fad4277",
"",
"root"
],
[
"e",
"8d53eea156bed16593214e83069eb129d9d8733f57c83272eb854bbb5444d390",
"",
"reply"
],
[
"p",
"ee0fa66772f633411e4432e251cfb15b1c0fe8cd8befd8b0d86eb302402a8b4a"
]
],
"content": "📅 Original date posted:2014-03-21\n📝 Original message:Maybe so, but given the relatively minor advantages of ECC certs I can see\nwhy a CA might not want to take any risks. They are sitting ducks for\npatent trolls.\n\nI think ECC will still happen, though we end up back into NSA fear\nterritory thanks to the stupid way secp256r1 was defined. *Hopefully* there's\nno back door.\n\n\nOn Fri, Mar 21, 2014 at 1:25 PM, Adam Back \u003cadam at cypherspace.org\u003e wrote:\n\n\u003e According to Bernstein it's patent FUD (expired, ancient and solid prior\n\u003e art).\n\u003e\n\u003e http://lists.randombit.net/pipermail/cryptography/2013-August/005126.html\n\u003e\n\u003e Adam\n\u003e\n\u003e\n\u003e On Fri, Mar 21, 2014 at 12:33:57PM +0100, Mike Hearn wrote:\n\u003e\n\u003e\u003e Oh, one other reason I found - apparently RIM, at least in the past,\n\u003e\u003e has been telling CA's that they need to pay mad bux for the Certicom\n\u003e\u003e ECC patents. So that's another reason why most certs are still using\n\u003e\u003e RSA.\n\u003e\u003e\n\u003e\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140321/802d380b/attachment.html\u003e",
"sig": "9e05374d6071f3a6014cf6359713ec766b312b509b22608b1569d3ef47b0ceb9ba6bf7a741f336593c1ff27e75f77824c5bb7b8f235822eda111c9148aa1a95e"
}