1024 bit encryption compromised?
Wed Mar 27 18:06:02 2002
We have one client using RSA. Last fall they moved to 4096 bits due to
rumors about vulnerability at 1024. We moved to 2048 bit DSA/ELG-E at the
same time. Perhaps we're just paranoid.
Stephen M Butler
First Choice Health Network
email@example.com GnuPG: 8B17 7384 AB86 D67F 7612 3587 5715 C880 1B32 D54B
firstname.lastname@example.org GnuPG: 8A25 9726 D439 758D D846 E5D4 282A 5477 0385 81D8
From: Oyvind A. Holm [mailto:email@example.com]
Sent: Wednesday, March 27, 2002 8:16 AM
Subject: 1024 bit encryption compromised?
According to a security debate sparked off by cryptography expert
Lucky Green on Bugtraq yesterday, 1,024-bit RSA encryption should
be "considered compromised".
The question is floating around among us -- would it be wise to upgrade
to 2048 bits, or is this just speculations? Now that they're talking
about this, I guess one should be a step ahead of the snoopers --
especially when it comes to the future robustness of the signatures.
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.