Fw: 1024-bit RSA keys in danger of compromise

technomage plug-discuss@lists.plug.phoenix.az.us
Tue, 26 Mar 2002 13:45:40 -0700


I did some reading on that document and a little research into the hardware. 
with current technology, the various government entities involved can build a 
cracker that will do the jon in MINUTES for less than 2 nillion USD.

time to start incorporating feistal arrays in new encryption algorythms.

Technomage

On Tuesday 26 March 2002 03:09 am, you wrote:
> Dennis Kibbe wrote:
> > > > - HTTPS
> > > > - SSH
> > > > - IPSec
> > > > - S/MIME
> > > > - PGP
> > > >
> > > > The most sensible recommendation in response to these findings at
> > > > this time is to upgraded your security infrastructure to utilize
> > > > 2048-bit user keys at the next convenient opportunity. Certificate
> > > > Authorities may wish to investigate larger keys as appropriate. Some
> > > > CA's, such as those used to protect digital satellite content in
> > > > Europe, have already moved to 4096-bit root keys.
> > >
> > > <SNIP> (Cut PGP keys, if you need Lucky's PGP keys, email him)
> >
> > Would this be a good time for a key signing party?
>
> I only skimmed the referenced doc.  The above seems like a quick fix.
>
> Does anyone know what the relative crack time might be compaired to
> Bernstines insites?
>
>   EBo --
>
> ps: I bet someone in the NSA is pissed!
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't
> post to the list quickly and you use Netscape to write mail.
>
> PLUG-discuss mailing list  -  PLUG-discuss@lists.plug.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss

-- 
I will not be pushed, filed, stamped, indexed, briefed, debriefed, or 
numbered!
My life is my own - No. 6