Fw: 1024-bit RSA keys in danger of compromise

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: technomage
Date:  
Subject: Fw: 1024-bit RSA keys in danger of compromise
I did some reading on that document and a little research into the hardware.
with current technology, the various government entities involved can build a
cracker that will do the jon in MINUTES for less than 2 nillion USD.

time to start incorporating feistal arrays in new encryption algorythms.

Technomage

On Tuesday 26 March 2002 03:09 am, you wrote:
> Dennis Kibbe wrote:
> > > > - HTTPS
> > > > - SSH
> > > > - IPSec
> > > > - S/MIME
> > > > - PGP
> > > >
> > > > The most sensible recommendation in response to these findings at
> > > > this time is to upgraded your security infrastructure to utilize
> > > > 2048-bit user keys at the next convenient opportunity. Certificate
> > > > Authorities may wish to investigate larger keys as appropriate. Some
> > > > CA's, such as those used to protect digital satellite content in
> > > > Europe, have already moved to 4096-bit root keys.
> > >
> > > <SNIP> (Cut PGP keys, if you need Lucky's PGP keys, email him)
> >
> > Would this be a good time for a key signing party?
>
> I only skimmed the referenced doc. The above seems like a quick fix.
>
> Does anyone know what the relative crack time might be compaired to
> Bernstines insites?
>
> EBo --
>
> ps: I bet someone in the NSA is pissed!
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't
> post to the list quickly and you use Netscape to write mail.
>
> PLUG-discuss mailing list -
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss


--
I will not be pushed, filed, stamped, indexed, briefed, debriefed, or
numbered!
My life is my own - No. 6