[10517] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Bernstein's fast factorization

daemon@ATHENA.MIT.EDU (Sidney Markowitz)
Wed Feb 27 12:52:56 2002

From: Sidney Markowitz <sidney@sidney.com>
To: Cryptography Mailing List <cryptography@wasabisystems.com>
In-Reply-To: <Pine.LNX.4.40.0202260832330.18597-100000@newbolt.sonic.net>
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Date: 26 Feb 2002 16:06:19 -0800
Message-Id: <1014768380.1381.6.camel@siddhasana>
Mime-Version: 1.0

Someone on another mailing list pointed me to this posting by Dan
Bernstein on sci.crypt newsgroup:

http://groups.google.com/groups?hl=en&selm=2002Jan1608.53.39.5497%40cr.yp.to

[begin quote]

 From: D. J. Bernstein (djb@cr.yp.to)
 Subject: Re: Strength of PGP vs SSL
 Newsgroups: comp.security.pgp.discuss, sci.crypt, alt.security.pgp
 Date: 2002-01-16 01:00:11 PST

Protecting against the http://cr.yp.to/papers.html#nfscircuit speedup
means switching from n-bit keys to f(n)-bit keys. I'd like to emphasize
that, at this point, very little is known about the function f. It's
clear that f(n) is approximately (3.009...)n for _very large_ sizes n,
but I don't know whether f(n) is larger than n for _useful_ sizes n.

I'd also like to emphasize that special-purpose hardware is useful for
much more than factorization. In fact, it's much easier to reduce cost
this way for secret-key cryptanalysis or elliptic-curve discrete log
than for factorization.

[end quote]

 -- sidney



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post