key length/size RSA discussion/recommendations in the wiki
Ingo Klöcker
kloecker at kde.org
Thu Oct 30 00:38:24 CET 2014
On Wednesday 29 October 2014 22:18:13 Peter Lebbing wrote:
> On 2014-10-29 21:49, vedaal at nym.hush.com wrote:
> > Surely Peter knows this too ;-)
> >
> > More likely 128 was a typo for the more common older RSA key of 1028
> > ...
>
> No, I'm using a strict definition of brute force.
>
> For p = 2^63 to 2^64-1
> For q = 2^63 to 2^64-1
> If p * q == n:
> Break
> Next
> Next
If anything then I'd do
For p = 2^63 to 2^64-1
If n modulo p == 0:
Break
Next
q = n / p
which is O(n^(1/2)), but IMO still brute force (even in your strict
definition), while yours is O((n^(1/2)^2) = O(n). "brute force" doesn't
mean that you have to use the most naïve algorithm.
> I don't feel the method outlined by Rob is still brute force. That
> brute actually is using his brain. Possibly his brain resembles a
> sieve, but still :). Am I too strict?
Actually, that brute doesn't seem to be using his brain. If he'd use his
brain then he'd use he fists to brute force the secret out of you. ;-p
Regards,
Ingo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20141030/7359334a/attachment.sig>
More information about the Gnupg-users
mailing list