[4589] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

key vulnerability

daemon@ATHENA.MIT.EDU (Udhay Shankar N)
Tue May 4 00:11:34 1999

Date: Tue, 04 May 1999 09:16:11 -0400
To: cryptography@c2.net
From: Udhay Shankar N <udhay@pobox.com>
In-Reply-To: <v03102805b3515bc63e95@[17.128.203.128]>

><http://www.nytimes.com/library/tech/99/05/biztech/articles/02encr.html>

[...]

>"Researchers said that if his machine worked it would mean that
>cryptographic systems with keys of 512 bits or less -- that is, keys less
>than about 150 digits long -- would be vulnerable in the future, an
>exposure that would have seemed unthinkable only five years ago. The longer
>1,024-bit keys that are available today would not be vulnerable at present."

I'm curious -- I'm in the process of phasing out my 768-bit RSA key, but
would it still be considered secure ? And if so, for how long ?

Udhay

~~*-,._.,-*~'`^`'~*-,._.,-*~'`^`'~*-,._.,-*~'`^`'~*-,._.,-*~'`^`'~*
     Udhay Shankar N,  Bangalore, India <udhay@pobox.com>
                http://www.pobox.com/~udhay
                   finger for public key



home help back first fref pref prev next nref lref last post