-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

El 13-12-2010 22:30, Robert J. Hansen escribió:
> On 12/13/2010 5:48 PM, Faramir wrote:
>> But supposedly, even with all these botnets, RSA-1024 has not been
>> broken yet. I don't know if there is some r...@home
> 
> The Berkeley BOINC framework can be pretty easily adapted to do this.

   Ah, good hint, I found n...@home, a project to factor large integers...
   There is also eni...@home, but that is a bit old fashioned ;)

   I think I'll stay with fold...@home

>> thing is breaking RSA-2048 would require about 10.000.000 times more
>> power than breaking RSA-1024, which -so far as we know- has not been
>> broken yet
> 
> Off by about a factor of 100 there.  RSA-2048 is roughly equivalent to a
> 112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key.
>  32 bits of difference equals a factor of four billion.  It's way harder
> than you think.

  Ok, that's even better ;) I took the MIPS-years estimation to break
RSA-1024, the estimation for breaking RSA-2048, and divided.

  Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJNCCLfAAoJEMV4f6PvczxAdm0H/1uvdoRRiiYoPUYVH4TbzGaV
LsK4b2URAzq7e51vjPqx3RfTsPSDLiKUP1aRyJXmAWiyLI5gftXhjT5wshc78BDQ
OEiP+BEVwe4Dh6mpVtODSUm8lpNcG5rViOAnRxE2nh/PYryZSyJcP/ipylGtxNVI
EDUAj3RYxQ5Vzpl+D3ouri33E+2FpG7XetHRoh/v/eCxyTccWHFHYa+T7U4HMFuJ
D7XTx337CFRsmkPgI7AMPgaENY9z3f+5IISeM4Ld0m/cyspl28IbG9ajk6GmHs8Z
6W/62xPwnWfWYqyxDxOXZ9ulftONkziWSyBpMuMdtBkigeelQbfnP6ztljTXZ8k=
=ln/S
-----END PGP SIGNATURE-----

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to