Re: key length/size RSA discussion/recommendations in the wiki

2014-11-06 Thread Bernhard Reiter
On Friday 31 October 2014 at 18:29:21, Robert J. Hansen wrote: > I agree that the FAQ is a bad place to present a chain of arguments and > the wiki is the natural spot for it.  My concern is that the FAQ and the > wiki need to be kept in sync somehow, and I'm not going to be watching > the wiki con

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-31 Thread Robert J. Hansen
> yes, I think that the recurring debate demands that the arguments > are made visible so they can be tested by readers. The FAQ is discussed in public and changes are submitted to the community for comment and review before I make any changes. So far, no one on the list has raised a serious obje

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-31 Thread Bernhard Reiter
Robert, On Wednesday 29 October 2014 at 19:00:39, Robert J. Hansen wrote: > > Because this gets asked quite often, I've started to capture > > some arguments of the debate how long RSAs could/should/can be > > at http://wiki.gnupg.org/LargeKeys > I thought we largely addressed this in the FAQ, se

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Ingo Klöcker
On Wednesday 29 October 2014 22:18:13 Peter Lebbing wrote: > On 2014-10-29 21:49, ved...@nym.hush.com wrote: > > Surely Peter knows this too ;-) > > > > More likely 128 was a typo for the more common older RSA key of 1028 > > ... > > No, I'm using a strict definition of brute force. > > For p =

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 22:30, Robert J. Hansen wrote: Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? Well, why not restrict ourselves to primes whose product equal the modulus? I could solve any key in constant time that wa

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> No, I'm using a strict definition of brute force. Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? If you're trying to factorize 2701, for instance, you can feel free to skip dividing by 2 (doesn't end in an even numbe

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> More likely 128 was a typo for the more common older RSA key of 1028 > ... Either-or. RSA-1024's dangerously close to being brute-forceable, too. We've already brute-forced RSA-768 and we're closing in on RSA-890. I haven't looked into how well the general number field sieve parallelizes, but

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 21:49, ved...@nym.hush.com wrote: Surely Peter knows this too ;-) More likely 128 was a typo for the more common older RSA key of 1028 ... No, I'm using a strict definition of brute force. For p = 2^63 to 2^64-1 For q = 2^63 to 2^64-1 If p * q == n: Break Next Nex

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread vedaal
On 10/29/2014 at 3:22 PM, "Robert J. Hansen" wrote: > >> Why is brute force even mentioned in something about RSA? You >> couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite >> covers it 8-) - Surely Peter knows this too ;-) More likely 128 was a typo for the more common older

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> Why is brute force even mentioned in something about RSA? You > couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite > covers it 8-) Sure you can. To brute-force a 128-bit RSA key would require you to check every prime number between two and 10**19. There are in the neighborhood of

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at <

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> Because this gets asked quite often, I've started to capture > some arguments of the debate how long RSAs could/should/can be > at http://wiki.gnupg.org/LargeKeys I thought we largely addressed this in the FAQ, sections 11.1, 11.2, 11.3, 11.4 and 11.5. Do we need to address it in more depth?