qqniceguyqq
Member
Offline
Activity: 358
Merit: 10
|
|
August 17, 2018, 06:06:51 AM |
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
|
|
|
|
app2endad
Member
Offline
Activity: 364
Merit: 10
|
|
August 17, 2018, 06:24:38 AM |
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it. However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter.
|
|
|
|
qqniceguyqq
Member
Offline
Activity: 358
Merit: 10
|
|
August 17, 2018, 06:52:37 AM |
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it. However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter. Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential.
|
|
|
|
blkgranit33
Newbie
Offline
Activity: 68
Merit: 0
|
|
August 17, 2018, 07:21:50 AM |
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it. However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter. Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential. Can anyone tell me how this algorithm will work in layman terms? I’d be very grateful!
|
|
|
|
mitchell69
Jr. Member
Offline
Activity: 80
Merit: 1
|
|
August 17, 2018, 09:31:37 AM |
|
How will session key be created in the process of communication in the messenger?
|
|
|
|
alcoholbtc
|
|
August 17, 2018, 09:47:38 AM |
|
What’s the maximum length of keys supported by PGR encryption algorithm? Or isn’t there any?
|
|
|
|
deort
Member
Offline
Activity: 406
Merit: 31
|
|
August 17, 2018, 12:13:49 PM |
|
Hi. Can i set an unlimited validity of encryption key? Or is it obligatory to set some particular validity period?
|
|
|
|
momo
Newbie
Offline
Activity: 294
Merit: 0
|
|
August 17, 2018, 12:23:07 PM |
|
How will key containers be protected within the framework of your ecosystem? It’s important for me to make it impossible for anyone else to use it even in case of physical access is gained.
|
|
|
|
unkletoken
|
|
August 17, 2018, 01:08:06 PM |
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it. However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter. Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential. Can anyone tell me how this algorithm will work in layman terms? I’d be very grateful! PGP encryption is based on public keys exchange method, in case of usage of which a pair of keys is responsible for encryption and decryption of data. The principle of described in details in our WP.
|
|
|
|
unkletoken
|
|
August 17, 2018, 01:16:33 PM |
|
How will session key be created in the process of communication in the messenger?
A session key is generated with the help of secure random number generator. A session key is encrypted with the help of an open key of a recipient with the usage of RSA or Elgamal algorithms (depending on the type of recipient’s key).
|
|
|
|
unkletoken
|
|
August 17, 2018, 01:24:44 PM |
|
What’s the maximum length of keys supported by PGR encryption algorithm? Or isn’t there any?
PGP supports three types of keys. It’s length is from 1024 to 4096 bits depending on technology.
|
|
|
|
unkletoken
|
|
August 17, 2018, 01:30:05 PM |
|
Hi. Can i set an unlimited validity of encryption key? Or is it obligatory to set some particular validity period?
Each type of keys can have limited or unlimited period.
|
|
|
|
unkletoken
|
|
August 17, 2018, 01:37:07 PM |
|
How will key containers be protected within the framework of your ecosystem? It’s important for me to make it impossible for anyone else to use it even in case of physical access is gained.
A secret phrase is used to protect key container.
|
|
|
|
lilurammm
Newbie
Offline
Activity: 82
Merit: 0
|
|
August 17, 2018, 04:20:06 PM |
|
Hello. Will the size of the data be changed after it gets encrypted? As a rule, the size reduces.
|
|
|
|
hichemdj
Newbie
Offline
Activity: 71
Merit: 0
|
|
August 17, 2018, 06:19:02 PM |
|
Why did you decide to use several encryption mechanisms in your system at the same time? It seemed to me that one would be enough.
|
|
|
|
gilberpro
Newbie
Offline
Activity: 105
Merit: 0
|
|
August 17, 2018, 08:17:00 PM |
|
Good evening. How many tokens were put on sale within the framework of the ICO?
|
|
|
|
RedlehA04
Newbie
Offline
Activity: 106
Merit: 0
|
|
August 17, 2018, 10:21:28 PM |
|
What will the nominal price of the token be during the following sale stage?
|
|
|
|
gilberpro
Newbie
Offline
Activity: 105
Merit: 0
|
|
August 18, 2018, 06:07:46 AM |
|
I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.
|
|
|
|
MkrKing
Member
Offline
Activity: 322
Merit: 12
|
|
August 18, 2018, 06:41:24 AM |
|
I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.
This is one of the most advanced encryption algorithms. Believe me, the STEEL team is experienced and it wouldn’t use the methods which won’t work out or have turned out to be ineffective.
|
|
|
|
gilberpro
Newbie
Offline
Activity: 105
Merit: 0
|
|
August 18, 2018, 07:05:41 AM |
|
I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.
This is one of the most advanced encryption algorithms. Believe me, the STEEL team is experienced and it wouldn’t use the methods which won’t work out or have turned out to be ineffective. But i constantly hear the news about leakage of secret US government info, that’s what made me doubting encryption quality.
|
|
|
|
|