Fw: 1024-bit RSA keys in danger of compromise

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: John (EBo) David
Date:  
Subject: Fw: 1024-bit RSA keys in danger of compromise
Dennis Kibbe wrote:
>
> > > - HTTPS
> > > - SSH
> > > - IPSec
> > > - S/MIME
> > > - PGP
> > >
> > > The most sensible recommendation in response to these findings at this
> > > time is to upgraded your security infrastructure to utilize 2048-bit
> > > user keys at the next convenient opportunity. Certificate Authorities
> > > may wish to investigate larger keys as appropriate. Some CA's, such as
> > > those used to protect digital satellite content in Europe, have already
> > > moved to 4096-bit root keys.
> > >
> > <SNIP> (Cut PGP keys, if you need Lucky's PGP keys, email him)
>
> Would this be a good time for a key signing party?


I only skimmed the referenced doc. The above seems like a quick fix.

Does anyone know what the relative crack time might be compaired to
Bernstines insites?

EBo --

ps: I bet someone in the NSA is pissed!