From: Eugen Leitl (eugen@leitl.org)
Date: Tue Apr 30 2002 - 10:21:10 MDT
On Tue, 30 Apr 2002, Dossy wrote:
> Recently, I saw something about a circuit design that could be
It was a paper by Daniel Bernstein, not a design.
> massively paralleized to break 1024-bit RSA keys in a very reasonable
> amount of time. It appears that the attitude is that "now 1024-bit
You can drop the "reasonable" (the initial estimate was off by several
orders of magnitude), and the estimated price tag is G$. Read up on the
impact of Bernstein's paper, if any, at
http://www.rsasecurity.com/rsalabs/ and at cypherpunks list archives node
of your choice.
> keys are not secure!" ... when have they ever been?
You're spreading pure FUD. Recommendations for key lenghts based on state
of the art have been around for many years, and is it happens deep
paranoia users (Lucky Green would qualify) shouldn't have had any 1024 bit
RSA keys to revoke in the year 2002 A.D.
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 09:13:43 MST