From: George Hannah Area: Public Key Encryption To: Jess Williams 11 Sep 94 17:14:56 Subject: Re: ENCRYPTION... UpdReq -=> Quoting Jess Williams to George Hannah <=- JW> They Cracked ONE RSA Key that used a key size of 129 DIGITS. JW> If they generated a second key of the same length it would probably JW> take them about the same amout of time and work to crack the second JW> key. PGP lets you choose key size up to "about" 1024 BITS. That makes sense. The article made it sound like these 2 129 digit numbers were an integral part of the algorithm. But I take it they would be part of the key. No ones going to spend 6 months cracking my key - it's just not worth it. JW> I'm not sure how many digits a 1024 bit key would be but I know that JW> it is substantially larger than 129 digits. Someone wrote a Somewhere around 292.5 digits. One decimal digit seems to take approx. 3.5 bits, the 129 digit number would be roughly 450 bits using the same formula. JW> conversion chart at one time. I was told that everytime you JW> lengthen a key by a bit you square the amount of time (roughly) JW> needed to crack it. I think it would double it. Since any number will hold 2^^bits values, you double the number of possible values, and therefore the amount of time to crack it. ... Canadian myth #1: Canadians end every sentence with eh. Eh? --- GEcho 1.10+ # Origin: Prophecy BBS [Fido] (506)652-7292 (1:255/7) * Origin: PODNet <-> FidoNet EchoGate! (93:9600/0.0) SEEN-BY: 107/946 147/1077 259/212 382/7 640/217 3611/19 9600/0 201434369420143436942014343694201434369420143436942014343694201 From: Richard Speidel Area: Public Key Encryption To: ALL 12 Sep 94 15:41:00 Subject: SecureNet UpdReq -----BEGIN PGP SIGNED MESSAGE----- Can anyone tell me where the nearest SecureNet support BBS is? -----BEGIN PGP SIGNATURE----- Version: 2.6 iQB1AwUBLnSu4FVdQwUlirpJAQE5awL/YogNHdoQp0QSibULHXE+NIol+D3pXcCV ubTlrT/wtigK0HFNtP/Ty1PjdmUBoseyD8KQe6rTcixZrHGvV7FlBz6/Mcsg7ybf CbIQ/maae3D8XK1Iw2XXbbuwy8ZCTfQ+ =Dlw1 -----END PGP SIGNATURE----- ~~~ PGPBLUE v1.7 ___ Blue Wave/QWK v2.12 --- EzyQwk V1.02 # Origin: Surfer's Shanty 1-904-238-5153/3996 (1:3623/15) * Origin: PODNet <-> FidoNet EchoGate! (93:9600/0.0) SEEN-BY: 107/946 147/1077 259/212 382/7 640/217 3611/19 9600/0 201434369420143436942014343694201434369420143436942014343694201 From: Shawn McMahon Area: Public Key Encryption To: Wes Landaker 13 Sep 94 12:31:54 Subject: RSA Broken UpdReq Despite the stern warnings of the tribal elders, Wes Landaker said this to George Hannah: WL> Yeah, basically. If they every get close to breaking at 384-bit WL> key (the weakest PGP key) Been there, done that. It takes thousands of MIPS/years, but that's easily within the reach of governments and businesses. I recommend you get that 1024-bit key ready now, and revoke your 384-bit. --- # Origin: Void Where Prohibited/2 (1:19/34) * Origin: PODNet <-> FidoNet EchoGate! (93:9600/0.0) SEEN-BY: 107/946 147/1077 259/212 382/7 640/217 3611/19 9600/0 201434369420143436942014343694201434369420143436942014343694201