From: feotus@yabbs
To: rattler@yabbs
Subject: re: rsa
Date: Wed May 4 10:03:05 1994
First off, they didnt do it on one machine, they just spread it out to a
bunch of different volounteer machines, which added up alot of proccessing
time.
Also it was a RSA129 key, now take however many bits are in that, and
subtract aht from 1024 and then take 2 to that power and that's how much
more difficult it is to break the 1024bit key than the RSA129.
for example, if you have a 400bit key, and you crack it, then you want to
try and crack the 1024bit key, you would have to expend 2^624 times more
power to do it. NOw that is a very large number, considering the number
of estimated moleculs in the universe is less than that.
So I say even with the NSAs computing power, which theyget to measure in
ACRES 8), it would take a long time to crack a 1024 bit key. Tho one of
the smaller PGP keys are suggested to be crackable in one year or so if
the NSA dedicated all of their processing time to it.
The thing is now, that it is so daunting to do that, they eitehr knock you
off real quiet like, or they get your passwd to your se3cret key. If it's
going to take them that long tim decrypt it, I'm sure they will justget
you out of the loop some other way.
|