Re: 1024-bit RSA keys in danger of compromise

2002-03-31 Thread Anonymous
Joseph Ashwood writes: > Bernstein's proposal does have an impact, but I do not believ that 3x the > key size is necessary > I believe Bernstein's proposal results in the necessity of a keysize of > approximately 1.5 times what was required before > I believe that there are further similar advance

Re: Re: 1024-bit RSA keys in danger of compromise

2002-03-31 Thread Joseph Ashwood
I have done a significant amount of considering on the very questions raised in this. This consideration has spanned approximately a month of time. These are my basic conclusions: Bernstein's proposal does have an impact, but I do not believ that 3x the key size is necessary I believe Bernstein's

Re: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread V Alex Brennen
On Mon, 25 Mar 2002, Bill Stewart wrote: > While SSL implementations are mostly 1024 bits these days, > aren't PGP Diffie-Hellman keys usually 1536 bits? I think there's a general consensus that the minimum recommended key size for X9.42 Diffie-Hellman PGP keys is 1024bits. I'm not sure if the

RE: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread Kevin Steves
On Thu, 28 Mar 2002, Lucky Green wrote: :Which brings me to an issue that I hope may be on-topic to this mailing :list: I would like to be able to enforce that the keys my users can use :to authenticate themselves to my sshd to be of a minimum size. Is there :a config option to sshd that will reje

RE: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread Lucky Green
[OK, let me try this again, since we clearly got off on the wrong foot here. My apologies for overreacting to Damien's post; I have been receiving dozens of emails from the far corners of the Net over the last few days that alternatively claimed that I was a stooge of the NSA because everybody kno

RE: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread A. Melon
> Here's a real question: if you could build a special purpose machine > to do 1024 bit RSA keys (that is, factor a 1024 bit number), how much > would that help with discrete logs in a safe prime field? Solving discrete logs via NFS is structurally similar to factoring. You start off with a facto

RE: 1024-bit RSA keys in danger of compromise

2002-03-28 Thread Tom Holroyd
You know, Lucky, most of the people here have been around the block a few times, and your previous post is just classic Usenet whinage. Complaining about puncuation indeed. Spare us, please. Look, we've all read the background. The improvement is a function f(n) which for large n may approach 3

mixmaster upgrades? (Re: 1024-bit RSA keys in danger of compromise)

2002-03-27 Thread Adam Back
I think it wouldn't hurt to use 2048 bit RSA keys for anything that supports them. I've been using 2048 bit RSA keys with PGP since 1995 based on the assumption even given uncertainty about the future of factoring that double the key size can't hurt, and didn't make any significant difference to

Re: 1024-bit RSA keys in danger of compromise

2002-03-26 Thread Eric Murray
Here's the distribution of RSA key sizes in SSL servers, as recorded by my SSL server survey in June 2000 and June 2001 RSA Server Key size Key bits2000 2001 2048 .2% .2% 1024 70% 80% >= 1

Re: 1024-bit RSA keys in danger of compromise

2002-03-26 Thread Meyer Wolfsheim
On Mon, 25 Mar 2002, Bill Stewart wrote: > While SSL implementations are mostly 1024 bits these days, > aren't PGP Diffie-Hellman keys usually 1536 bits? The ElGamal encryption keys (Diffie-Hellman is a misnomer in PGP's case) are usually 2048 bits, though the DSA signing keys are almost always

Re: 1024-bit RSA keys in danger of compromise

2002-03-26 Thread Bill Stewart
At 05:38 PM 03/23/2002 -0800, Lucky Green wrote: >While the latter doesn't warrant comment, one question to ask >spokespersons pitching the former is "what key size is the majority of >your customers using with your security product"? Having worked in this >industry for over a decade, I can state

Re: 1024-bit RSA keys in danger of compromise

2002-03-24 Thread Ian Goldberg
In article <00e101c1d2d8$c9768080$c33a080a@LUCKYVAIO>, Lucky Green <[EMAIL PROTECTED]> wrote: >The panel, consisting of Ian Goldberg and Nicko van Someren, put forth >the following rough first estimates: I'd just like to credit the "O(minutes)" calculation to Nicko; my own opinion was that: - We

Re: 1024-bit RSA keys in danger of compromise

2002-03-23 Thread Anonymous
Lucky Green writes: > The panel, consisting of Ian Goldberg and Nicko van Someren, put forth > the following rough first estimates: > > While the interconnections required by Bernstein's proposed architecture > add a non-trivial level of complexity, as Bruce Schneier correctly > pointed out in his

1024-bit RSA keys in danger of compromise

2002-03-23 Thread Lucky Green
[The LNE node bounced my first attempt at sending this email since it exceeded the length constraints. My apologies if you are receiving this email twice]. As those of you who have discussed RSA keys size requirements with me over the years will attest to, I always held that 1024-bit RSA keys cou