Best Practices

Robert J. Hansen rjh at
Tue Dec 14 02:30:29 CET 2010

On 12/13/2010 5:48 PM, Faramir wrote:
> But supposedly, even with all these botnets, RSA-1024 has not been
> broken yet. I don't know if there is some RSA at Home

The Berkeley BOINC framework can be pretty easily adapted to do this.

> thing is breaking RSA-2048 would require about 10.000.000 times more
> power than breaking RSA-1024, which -so far as we know- has not been
> broken yet

Off by about a factor of 100 there.  RSA-2048 is roughly equivalent to a
112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key.
 32 bits of difference equals a factor of four billion.  It's way harder
than you think.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5598 bytes
Desc: S/MIME Cryptographic Signature
URL: </pipermail/attachments/20101213/5250c724/attachment.bin>

More information about the Gnupg-users mailing list