On 12/13/2010 5:48 PM, Faramir wrote:
> But supposedly, even with all these botnets, RSA-1024 has not been
> broken yet. I don't know if there is some r...@home

The Berkeley BOINC framework can be pretty easily adapted to do this.

> thing is breaking RSA-2048 would require about 10.000.000 times more
> power than breaking RSA-1024, which -so far as we know- has not been
> broken yet

Off by about a factor of 100 there.  RSA-2048 is roughly equivalent to a
112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key.
 32 bits of difference equals a factor of four billion.  It's way harder
than you think.


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to