GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

John Clizbe John at Mozilla-Enigmail.org
Sat Nov 28 19:03:27 CET 2009


Robert J. Hansen wrote:
> David Shaw wrote:
>> Difficult question to answer, since everyone is going to wave around
>> their opinion. :)
> 
> There are some empirical facts which may be useful, though -- like
> observing the RC5-64 project was able to break a 64-bit key via a
> massive distributed project that took 18 months of runtime.
> 

And estimates for RC5-72 including Moore's Law effects were hovering at 18 years.

-- 
John P. Clizbe                      Inet:John (a) Mozilla-Enigmail.org
You can't spell fiasco without SCO. hkp://keyserver.gingerbear.net  or
     mailto:pgp-public-keys at gingerbear.net?subject=HELP

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 679 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20091128/51c1cf04/attachment.pgp>


More information about the Gnupg-users mailing list