4096 bit keys

Jonathan Ely thajsta at gmail.com
Tue Mar 22 23:06:30 CET 2011


I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.

On 22/03/2011 05:14 PM, Mike Acker wrote:
> with chip makers playing with chips having 64 cores printed in silicon...
> 
> someplace i read the ratios on this,-- if you make the key a little
> longer the key gets much harder to break.  in public key encryption
> though you have to factor the product of the two large prime numbers --
> which i'm told is no easy task.  i've often wondered about this as lists
> of large prime numbers are not hard to come by... so-- start someplace
> and start running divides... trouble is though you can't use the
> hardware instruction set: the numbers are way to large
> 
> what does an x64 chip do? divide a 64 bit integer into a 128 bit
> dividend to yield a 64 but quotient and a 64 bit remainder? dunno but
> you have to do the same thing but using what? a 2048 or 4096 bit dividend?
> 
> (I'm not a mathematician)
> 
> what if they put 8192 cores on a chip? who would have such a machine?
> NSA.  the smart money would bet they would have it
> 
> 
> 
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 834 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20110322/a610862f/attachment.pgp>


More information about the Gnupg-users mailing list