I did some reading on that document and a little research into the hardware. with current technology, the various government entities involved can build a cracker that will do the jon in MINUTES for less than 2 nillion USD. time to start incorporating feistal arrays in new encryption algorythms. Technomage On Tuesday 26 March 2002 03:09 am, you wrote: > Dennis Kibbe wrote: > > > > - HTTPS > > > > - SSH > > > > - IPSec > > > > - S/MIME > > > > - PGP > > > > > > > > The most sensible recommendation in response to these findings at > > > > this time is to upgraded your security infrastructure to utilize > > > > 2048-bit user keys at the next convenient opportunity. Certificate > > > > Authorities may wish to investigate larger keys as appropriate. Some > > > > CA's, such as those used to protect digital satellite content in > > > > Europe, have already moved to 4096-bit root keys. > > > > > > (Cut PGP keys, if you need Lucky's PGP keys, email him) > > > > Would this be a good time for a key signing party? > > I only skimmed the referenced doc. The above seems like a quick fix. > > Does anyone know what the relative crack time might be compaired to > Bernstines insites? > > EBo -- > > ps: I bet someone in the NSA is pissed! > ________________________________________________ > See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't > post to the list quickly and you use Netscape to write mail. > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss -- I will not be pushed, filed, stamped, indexed, briefed, debriefed, or numbered! My life is my own - No. 6