Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> why we're not dramatically ramping up key sizes across the board on all encryption?

because no one thinks there is a reason to, no one has any fear that classical computers will catch up with RSA-2048/AES-128 before their grand children are dead.

post-quantum crypt stuff is happening and people are planning how to migrate to it.



Well, even MD4 hasn't been cracked yet.


What is your definition of cracked? Collisions are easy to produce; there's one right on the Wikipedia page.


Collisions are not interesting. Millions of leaked passwords hashed with MD4/MD5 are of very practical interest.


Ok, preimage resistance is still pretty strong, but it has been reduced enough that I wouldn't trust it remaining above practical attacks beyond the next decade.


If you use the same password on different sites despite password managers and now passkeys you are asking for it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: