1996-01-17 - Re: pgp broken?

Header Data

From: “Mark M.” <markm@voicenet.com>
To: cypherpunks@toad.com
Message Hash: 93319d53912e2ec3d2fd083e503e433ae232a7afb7abadbfe224a15b95636e80
Message ID: <Pine.LNX.3.91.960116201005.2004A-100000@localhost>
Reply To: <9601162346.AA22192@toad.com>
UTC Datetime: 1996-01-17 10:22:28 UTC
Raw Date: Wed, 17 Jan 1996 18:22:28 +0800

Raw message

From: "Mark M." <markm@voicenet.com>
Date: Wed, 17 Jan 1996 18:22:28 +0800
To: cypherpunks@toad.com
Subject: Re: pgp broken?
In-Reply-To: <9601162346.AA22192@toad.com>
Message-ID: <Pine.LNX.3.91.960116201005.2004A-100000@localhost>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 16 Jan 1996, greg pitz wrote:
> In speaking with an associate, he mentioned in passing that PGP had 
> been broken a few weeks ago in San Diego by the DoD using a Cray.  
> All questioning about said subject was ended immediately as he felt 
> that he might have said too much how it was.  Was PGP "broken"?
> 
PGP has already been "broken" -- the 384-bit Blacknet key was factored.
Just because the government may be able to factor a 512-bit key, it does not
mean that they can break 2048, 1024, or even a 709-bit key.  If this person
was telling the truth, the government probably only broke a small key.  

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMPxN6LZc+sv5siulAQHlKQP/cdHOmErMIUuIEGWdQ1EL+PhW5RexaxsA
bUDv0eLZ8vPnRDShhWuA6Mo01Vvyej4hu+FkBomqKlmMSjl0YRK9UisoJ30gbrbj
N1obHDsa7BK+jVt1rSujEECDS/GFJ+m4iPyJcnKVRlKK10n+2iTbQ24r2e3ZdcP0
59jYpfbYE8o=
=ReUZ
-----END PGP SIGNATURE-----


--

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
markm@voicenet.com              | finger -l for PGP key 0xf9b22ba5
http://www.voicenet.com/~markm/ | bd24d08e3cbb53472054fa56002258d5
PGP: Because sometimes, a _Captain Midnight_ decoder ring simply
isn't enough.





Thread