1024 or 2048??
Michael Anckaert
manckaert@belgacom.net
Fri Apr 12 17:29:01 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Friday 12 April 2002 08:03, you wrote:
> On Thursday 2002-04-11 at 20:59:16 -0700, Leigh S. Jones wrote:
> > Of course the reason that messages encrypted with 4096 bits of public
> > key
> > can be broken is that the NSA is equipped to brute force the symmetric
> > encryption after some time.
>
> ...and how many millions of years is that?
>
> David Trudgett
> if they really want to get to your data, they can break a 4096 bits key in
about 7-8 months. But they wont do that unless you're a really big guy named
osamma... After all it will take all their resources they have to break in
such a short time span.
- --
- ----------------------------------------------
Michael Anckaert
manckaert@belgacom.net
http://galileo.spaceports.com/~xantor
Public gpg key: xantor <xantor@carpathia>
Public gpg key-id: 360AC4A6
- ----------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAnMcbGoACgkQ+99tlzYKxKbDzACdGUexRNKnS+6qcfiMXTtVzfz3
O8wAnjyq6pe0Fxm8U668GflpTTq9lbfX
=S9wn
-----END PGP SIGNATURE-----