| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | PGP is NOT broken! |
RW> If you are talking about PGP, I believe a 1024 bit encryption key
RW> WAS broken by a student using 12-14 SPARC workstations - took 10-14
RW> days but it was broken.
LB> But I think you're wrong! And it is a critical issue.
I asked in PUBLIC_KEYS , the Fido echo devoted to public key
cryptography like PGP, and got an authoritative answer (others agreed):
--- Following message extracted from PUBLIC_KEYS @ 1:3615/50.1 ---
By Lee Bonnifield on Thu Jul 11 13:18:26 1996
From: Ian Hebert
To: Lee Bonnifield
Date: 10 Jul 96 14:42:30
Subj: key post/1024 cracked?
RW> It is very possible I might be wrong on the length of the key -
RW> however the fact is a student did break a key - and it wasn't
RW> something insignificant. It took around 2 weeks using if I recall 8-12
RW> Sparc workstations.
LB> If anybody recognizes this claim as more than a rumor, please speak
LB> up.
I think what you're referring to here is the French student who used a
series of workstations to break the Netscape 40-bit key in a little over
a week (I think it was 8 days, actually.)
Ian Hebert London, Ontario, Canada
Internet: ian@braille.uwo.ca PGP Key ID/Date: 077A2F7F / 1993/02/11
PGP key fingerprint: A2 15 DE 22 DA FE D4 DC 0F 17 43 24 1F F2 1E 7B
PGP Key available on keyservers or by finger
--- OLMS 2.60p.a1+ [EPMAP55A]
Netscape would never have used such a puny key (for their Secure
Sockets Layer, which secures international web connections) except
CURRENT regulations prevent them from using a larger key in this
product intended for export.
RW> I'm not into "debating" 512 or 1024 bits or whatever.
No debate necessary, end of thread unless you want more.
LB> IF you're wrong, the effect of your post would be like the
LB> moderator of PUBLIC_KEYS posting that marijuana causes hair loss or
LB> something equally unsupported.
RW> Not something that unsupported - the only thing that might be
RW> wrong is the length of the key broken - not something that is GROSSLY
RW> innaccurate.
There is a HUGE difference between a 40 bit key and a 428 bit key,
which is the largest (I think) that has actually been broken. There is
a HUGE difference between a 428 bit key, and a 512 bit key which is
the smallest PGP has allowed for years. It's more common for PGP users
to pick 1024 or 2048 bit keys. Spreading FUD about the safety of PGP
(and of digital cash that preserves privacy) because you misremembered
the crack of a 40 bit key *is* GROSSLY inaccurate.
The reason I think it is important to correct the record on this is
that ENCOURAGING many people to use PGP might help keep it legal.
The Clinton Administration has circulated an outline to Congress which
states:
"We will seek legislation to strengthen our ability to
prevent terrorists from coming into the possession of the
technology to encrypt their communications and data so that they
are beyond the reach of law enforcement."
Until PGP is outlawed, the only hope the FBI has to slow the spread of
PGP is if enough people like you spread false rumors about its
vulnerability.
RW> For me it is not something I'm willing (or able due to time) to
RW> research more fully.
In that case it would be better to say nothing.
(swiped from another PUBLIC_KEYS post:)
MIT has released Philip Zimmermann's PGPfone 1.0b7 for Macintosh and
1.0b2 for Windows95 or NT. This new secure telephone product is now
available for download at the MIT PGP distribution web site:
http://web.mit.edu/pgp
or: http://web.mit.edu/network/pgpfone
Using PGPfone is like using a telephone, except no one else can
eavesdrop on your conversation. PGPfone lets you whisper in someone's
ear, even if their ear is a thousand miles away. Secure voice calls
are supported over the Internet, or through a direct modem-to-modem
connection, or even over AppleTalk networks.
--- PPoint 2.00
---------------
* Origin: Multiboard * 519-660-8981/6908 * Email * 2GB * (1:2401/0)* Origin: Home of TV Agent (1:3615/50.1) |
|
| SOURCE: echomail via exec-pc | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.