Best Practices

Faramir faramir.cl at gmail.com
Wed Dec 15 03:07:27 CET 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

El 13-12-2010 22:30, Robert J. Hansen escribió:
> On 12/13/2010 5:48 PM, Faramir wrote:
>> But supposedly, even with all these botnets, RSA-1024 has not been
>> broken yet. I don't know if there is some RSA at Home
> 
> The Berkeley BOINC framework can be pretty easily adapted to do this.

   Ah, good hint, I found NFS at home, a project to factor large integers...
   There is also Enigma at home, but that is a bit old fashioned ;)

   I think I'll stay with Folding at home

>> thing is breaking RSA-2048 would require about 10.000.000 times more
>> power than breaking RSA-1024, which -so far as we know- has not been
>> broken yet
> 
> Off by about a factor of 100 there.  RSA-2048 is roughly equivalent to a
> 112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key.
>  32 bits of difference equals a factor of four billion.  It's way harder
> than you think.

  Ok, that's even better ;) I took the MIPS-years estimation to break
RSA-1024, the estimation for breaking RSA-2048, and divided.

  Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJNCCLfAAoJEMV4f6PvczxAdm0H/1uvdoRRiiYoPUYVH4TbzGaV
LsK4b2URAzq7e51vjPqx3RfTsPSDLiKUP1aRyJXmAWiyLI5gftXhjT5wshc78BDQ
OEiP+BEVwe4Dh6mpVtODSUm8lpNcG5rViOAnRxE2nh/PYryZSyJcP/ipylGtxNVI
EDUAj3RYxQ5Vzpl+D3ouri33E+2FpG7XetHRoh/v/eCxyTccWHFHYa+T7U4HMFuJ
D7XTx337CFRsmkPgI7AMPgaENY9z3f+5IISeM4Ld0m/cyspl28IbG9ajk6GmHs8Z
6W/62xPwnWfWYqyxDxOXZ9ulftONkziWSyBpMuMdtBkigeelQbfnP6ztljTXZ8k=
=ln/S
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list