Matching cryptographic primitive strengths | Dark Hacker News