Fw: 1024-bit RSA keys in danger of compromise

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Dennis Kibbe
Date:  
Subject: Fw: 1024-bit RSA keys in danger of compromise
On Mon, Mar 25, 2002 at 04:18:14PM -0700, Tony Wasson wrote:
> Ouch! From BugTraq in case you haven't already seen it.
>
> Tony Wasson
>
> ----- Original Message -----
> From: "Lucky Green" <>
> To: <>
> Sent: Saturday, March 23, 2002 6:38 PM
> Subject: 1024-bit RSA keys in danger of compromise
>

<snip>
> > and DH keys are staggering, since of the following systems as currently
> > deployed tend to utilize keys larger than 1024-bits:
> >
> > - HTTPS
> > - SSH
> > - IPSec
> > - S/MIME
> > - PGP
> >
> > The most sensible recommendation in response to these findings at this
> > time is to upgraded your security infrastructure to utilize 2048-bit
> > user keys at the next convenient opportunity. Certificate Authorities
> > may wish to investigate larger keys as appropriate. Some CA's, such as
> > those used to protect digital satellite content in Europe, have already
> > moved to 4096-bit root keys.
> >
> <SNIP> (Cut PGP keys, if you need Lucky's PGP keys, email him)


Would this be a good time for a key signing party?

Dennis Kibbe