Best Practices
Robert J. Hansen
rjh at sixdemonbag.org
Tue Dec 14 02:30:29 CET 2010
On 12/13/2010 5:48 PM, Faramir wrote:
> But supposedly, even with all these botnets, RSA-1024 has not been
> broken yet. I don't know if there is some RSA at Home
The Berkeley BOINC framework can be pretty easily adapted to do this.
> thing is breaking RSA-2048 would require about 10.000.000 times more
> power than breaking RSA-1024, which -so far as we know- has not been
> broken yet
Off by about a factor of 100 there. RSA-2048 is roughly equivalent to a
112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key.
32 bits of difference equals a factor of four billion. It's way harder
than you think.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5598 bytes
Desc: S/MIME Cryptographic Signature
URL: </pipermail/attachments/20101213/5250c724/attachment.bin>
More information about the Gnupg-users
mailing list