Hacker News new | past | comments | ask | show | jobs | submit login

With cryptographic protocols that rely on the difficulty of factoring large semiprimes, aren't you supposed to use primes that no one else has used before? If you use the same primes to make your key, then you would have the same key as someone else.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: