-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 El 13-12-2010 22:30, Robert J. Hansen escribió: > On 12/13/2010 5:48 PM, Faramir wrote: >> But supposedly, even with all these botnets, RSA-1024 has not been >> broken yet. I don't know if there is some r...@home > > The Berkeley BOINC framework can be pretty easily adapted to do this.
Ah, good hint, I found n...@home, a project to factor large integers... There is also eni...@home, but that is a bit old fashioned ;) I think I'll stay with fold...@home >> thing is breaking RSA-2048 would require about 10.000.000 times more >> power than breaking RSA-1024, which -so far as we know- has not been >> broken yet > > Off by about a factor of 100 there. RSA-2048 is roughly equivalent to a > 112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key. > 32 bits of difference equals a factor of four billion. It's way harder > than you think. Ok, that's even better ;) I took the MIPS-years estimation to break RSA-1024, the estimation for breaking RSA-2048, and divided. Best Regards -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBCAAGBQJNCCLfAAoJEMV4f6PvczxAdm0H/1uvdoRRiiYoPUYVH4TbzGaV LsK4b2URAzq7e51vjPqx3RfTsPSDLiKUP1aRyJXmAWiyLI5gftXhjT5wshc78BDQ OEiP+BEVwe4Dh6mpVtODSUm8lpNcG5rViOAnRxE2nh/PYryZSyJcP/ipylGtxNVI EDUAj3RYxQ5Vzpl+D3ouri33E+2FpG7XetHRoh/v/eCxyTccWHFHYa+T7U4HMFuJ D7XTx337CFRsmkPgI7AMPgaENY9z3f+5IISeM4Ld0m/cyspl28IbG9ajk6GmHs8Z 6W/62xPwnWfWYqyxDxOXZ9ulftONkziWSyBpMuMdtBkigeelQbfnP6ztljTXZ8k= =ln/S -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users