Best Practices

Faramir at
Mon Dec 13 23:48:49 CET 2010

Hash: SHA256

El 13-12-2010 7:10, Ingo Klöcker escribió:
> On Monday 13 December 2010, Faramir wrote:
>>   If RSA 1024 becomes breakable today, and after that factorizing
>> keys become 1000 times easier that it is today, and computers become
>> 1000 times more powerful, they would still need at least 10 times
>> more power to break RSA 2048. Yes, a lot of if's, but still useful
>> to give an idea about how harder it would be.
> Well, SETI at Home claims to have over 3 million users. Large botnets have 
> tens of thousands slaves. GPUs are in some areas several magnitudes 
> faster than CPUs. There go your "several orders of magnitude".

  But supposedly, even with all these botnets, RSA-1024 has not been
broken yet. I don't know if there is some RSA at Home, but anyway, the
thing is breaking RSA-2048 would require about 10.000.000 times more
power than breaking RSA-1024, which -so far as we know- has not been
broken yet, they would need a botnet a lot bigger...

  I searched in google, and found a paper doing estimations about how
many MIPS-year would a botnet have on year 2007. Based on that
assumption, they calculated how much time would it take to break 1
RSA-1024 key. I searched by "MIPS year botnet" (without the " marks),
and the first result is the paper, named "Spam, Phishing, and the
Looming Challenge of Big Botnets", by René H. Hemmingsen. Department of
Computer Science. University of Copenhagen, Denmark.

  Pages 7 to 9.

  Best Regards
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla -


More information about the Gnupg-users mailing list