Best Practices

Faramir faramir.cl at gmail.com
Mon Dec 13 23:48:49 CET 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

El 13-12-2010 7:10, Ingo Klöcker escribió:
> On Monday 13 December 2010, Faramir wrote:
...
>>   If RSA 1024 becomes breakable today, and after that factorizing
>> keys become 1000 times easier that it is today, and computers become
>> 1000 times more powerful, they would still need at least 10 times
>> more power to break RSA 2048. Yes, a lot of if's, but still useful
>> to give an idea about how harder it would be.
> 
> Well, SETI at Home claims to have over 3 million users. Large botnets have 
> tens of thousands slaves. GPUs are in some areas several magnitudes 
> faster than CPUs. There go your "several orders of magnitude".

  But supposedly, even with all these botnets, RSA-1024 has not been
broken yet. I don't know if there is some RSA at Home, but anyway, the
thing is breaking RSA-2048 would require about 10.000.000 times more
power than breaking RSA-1024, which -so far as we know- has not been
broken yet, they would need a botnet a lot bigger...

  I searched in google, and found a paper doing estimations about how
many MIPS-year would a botnet have on year 2007. Based on that
assumption, they calculated how much time would it take to break 1
RSA-1024 key. I searched by "MIPS year botnet" (without the " marks),
and the first result is the paper, named "Spam, Phishing, and the
Looming Challenge of Big Botnets", by René H. Hemmingsen. Department of
Computer Science. University of Copenhagen, Denmark.

  Pages 7 to 9.

  Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJNBqLRAAoJEMV4f6PvczxAjtgH/iQifbgqqiWX7n9Q9cI4cNA3
II4dc4gLlOcDrcnyW87+x1NkYZQ04Fb+YYCu4rJCZH6EzGjK9AxTbZ7xEabIn19c
rhUC18S7JKBRHRs5Sq+uaGrhpxPyTD/5shblzxoQdXBLzlGrucDhaRhdps69SIqi
dOMWRQgIZj+qEyMSBiNBoxaf30UdOCs4hGEJKRkPrqUUIXlVcUqpSuxZ/i3odOHr
UHoOaFd2Rlai59i1Co0qw/+WfC/JK7Cn4ETjsmx1lPC1D9LPIfoWqhgVQPJAkqgo
K5oJNRexBDOZUCkBXiHl4yA04dNc/uiDeTiTOj0KT0MMNtBRK7Shm0HBR5nX+AY=
=3/dq
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list