[10629] in cryptography@c2.net mail archive
Re: 1024-bit RSA keys in danger of compromise
daemon@ATHENA.MIT.EDU (A. Melon)
Mon Mar 25 11:41:07 2002
Date: Sun, 24 Mar 2002 22:10:04 -0800
From: "A. Melon" <juicy@melontraffickers.com>
To: cryptography@wasabisystems.com
Message-ID: <ce4f09c024b20a48e664bce201af6260@melontraffickers.com>
Please note the following follow-up message on cypherpunks from
Ian Goldberg:
From: iang@abraham.cs.berkeley.edu (Ian Goldberg)
Subject: CDR: Re: 1024-bit RSA keys in danger of compromise
Date: 24 Mar 2002 18:08:32 GMT
In article <00e101c1d2d8$c9768080$c33a080a@LUCKYVAIO>,
Lucky Green <shamrock@cypherpunks.to> wrote:
>The panel, consisting of Ian Goldberg and Nicko van Someren, put forth
>the following rough first estimates:
I'd just like to credit the "O(minutes)" calculation to Nicko;
my own opinion was that:
- We have no reason to believe the asymptotic result applies to "real"
  keylengths (2^1024 <<< infinity)
- The physical properties of such a machine (size, power, cooling, etc.)
  seem implausible to me.
I personally don't intend to be revoking my 1024 bit key at this time.
   - Ian
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com