Difference between revisions of "RSA"
Jump to navigation
Jump to search
↑ https://support.apple.com/en-us/HT210176
Line 24: | Line 24: | ||
* <code>[[easy-rsa]]</code> | * <code>[[easy-rsa]]</code> | ||
* [[ssh]]'s [[challenge-response]] system based on RSA | * [[ssh]]'s [[challenge-response]] system based on RSA | ||
+ | * [[ECC]] | ||
== Activities == | == Activities == |
Revision as of 11:13, 25 July 2024
Key length macOS 10.15 requires that TLS server certificates and issuing CAs using RSA keys must use key sizes greater than or equal to 2048. [1]
- OpenSSH 7.6
- Refuse RSA keys <1024 bits in length and improve reporting for keys that do not meet this requirement.
- OpenSSH 4.2: September 1, 2005 https://www.openssh.com/txt/release-4.2
- Increase the default size of new RSA/DSA keys generated by
ssh-keygen
from 1024 to 2048 bits.
- Increase the default size of new RSA/DSA keys generated by
Related terms
openssl
ssh-keygen -t rsa
- RSA Conference
- RSA Award for Excellence in Mathematics
easy-rsa
- ssh's challenge-response system based on RSA
- ECC
Activities
See also
- CSR, Create a certificate:
openssl req
- Public-key cryptography: RSA, DSA, ECDSA, EdDSA (Ed25519), AES, RSA Conference, hash,
pkeyutl
, Signature, key length, Easyrsa, OAEP, Ron Rivest, Adi Shamir, Leonard Adleman - TLS, mTLS: OpenSSL, LibreSSL, BoringSSL, WolfSSL, X.509,
.pem
, SNI, CT, OCSP, Mbed TLS, ALPN,your connection is not private
, SSL Certificate Checker, Wildcard certificate, JA3 fingerprint, sslcan, TLS inspection - Cypher: Hash, MD5, SHA, Bcrypt, Blowfish, HMAC, Equihash, Argon2
Advertising: