News

In 2005, it was demonstrated that with enough computing power, one could find ... algorithms have the advantage of using the same key type as "ssh-rsa" but use the safe SHA-2 hash algorithms.