Fw: 1024-bit RSA keys in danger of compromise

Dennis Kibbe plug-discuss@lists.plug.phoenix.az.us
Mon, 25 Mar 2002 21:04:16 -0700


On Mon, Mar 25, 2002 at 04:18:14PM -0700, Tony Wasson wrote:
> Ouch! From BugTraq in case you haven't already seen it.
> 
> Tony Wasson
> 
> ----- Original Message ----- 
> From: "Lucky Green" <shamrock@cypherpunks.to>
> To: <cypherpunks@lne.com>
> Sent: Saturday, March 23, 2002 6:38 PM
> Subject: 1024-bit RSA keys in danger of compromise
> 
<snip>
> > and DH keys are staggering, since of the following systems as currently
> > deployed tend to utilize keys larger than 1024-bits:
> > 
> > - HTTPS
> > - SSH
> > - IPSec
> > - S/MIME
> > - PGP
> > 
> > The most sensible recommendation in response to these findings at this
> > time is to upgraded your security infrastructure to utilize 2048-bit
> > user keys at the next convenient opportunity. Certificate Authorities
> > may wish to investigate larger keys as appropriate. Some CA's, such as
> > those used to protect digital satellite content in Europe, have already
> > moved to 4096-bit root keys.
> > 
> <SNIP> (Cut PGP keys, if you need Lucky's PGP keys, email him)
 
Would this be a good time for a key signing party?

Dennis Kibbe