4096 bit keys
Jonathan Ely
thajsta at gmail.com
Tue Mar 22 23:06:30 CET 2011
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
On 22/03/2011 05:14 PM, Mike Acker wrote:
> with chip makers playing with chips having 64 cores printed in silicon...
>
> someplace i read the ratios on this,-- if you make the key a little
> longer the key gets much harder to break. in public key encryption
> though you have to factor the product of the two large prime numbers --
> which i'm told is no easy task. i've often wondered about this as lists
> of large prime numbers are not hard to come by... so-- start someplace
> and start running divides... trouble is though you can't use the
> hardware instruction set: the numbers are way to large
>
> what does an x64 chip do? divide a 64 bit integer into a 128 bit
> dividend to yield a 64 but quotient and a 64 bit remainder? dunno but
> you have to do the same thing but using what? a 2048 or 4096 bit dividend?
>
> (I'm not a mathematician)
>
> what if they put 8192 cores on a chip? who would have such a machine?
> NSA. the smart money would bet they would have it
>
>
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 834 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20110322/a610862f/attachment.pgp>
More information about the Gnupg-users
mailing list