[10634] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: 1024-bit RSA keys in danger of compromise

daemon@ATHENA.MIT.EDU (Enzo Michelangeli)
Mon Mar 25 11:52:11 2002

Message-ID: <00a001c1d419$374abb80$0200000a@noip.com>
Reply-To: "Enzo Michelangeli" <em@em.no-ip.com>
From: "Enzo Michelangeli" <em@who.net>
To: "Lucky Green" <shamrock@cypherpunks.to>
Cc: <cryptography@wasabisystems.com>
Date: Tue, 26 Mar 2002 00:21:18 +0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

----- Original Message -----
From: "Lucky Green" <shamrock@cypherpunks.to>
To: <cypherpunks@lne.com>
Sent: Sunday, 24 March, 2002 9:38 AM
Subject: 1024-bit RSA keys in danger of compromise


[...]
> In light of the above, I reluctantly revoked all my personal 1024-bit
> PGP keys and the large web-of-trust that these keys have acquired over
> time. The keys should be considered compromised. The revoked keys and my
> new keys are attached below.

Hmmm... I see that the new 4096-bit super-duper key, besides its own (which
doesn't prove much), only bears the signatures of the now revoked -as
potentially compromised- old keys 0x375AD924 and 0xEEE8CFF3, plus 0x06757D2D
(which turns out to be a 1024-bit DSA key) and 0x50C0FEA7 (a lowly 2048-bit
RSA legacy key)...

Are you really our Lucky, or the NSA proving our worst fears founded? ;-)

Enzo




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post