1996-04-15 - Re: RSA-130 Falls to NFS - Lenstra Posting to sci.crypt.research

Header Data

From: Jim Gillogly <jim@ACM.ORG>
To: cypherpunks@toad.com
Message Hash: 0b584bc8b45326483f056e0b2512126a5179a6aa1612bf701714ee53cca30410
Message ID: <199604150751.AAA06516@mycroft.rand.org>
Reply To: <199604150622.XAA07542@netcom4.netcom.com>
UTC Datetime: 1996-04-15 11:36:16 UTC
Raw Date: Mon, 15 Apr 1996 19:36:16 +0800

Raw message

From: Jim Gillogly <jim@ACM.ORG>
Date: Mon, 15 Apr 1996 19:36:16 +0800
To: cypherpunks@toad.com
Subject: Re: RSA-130 Falls to NFS - Lenstra Posting to sci.crypt.research
In-Reply-To: <199604150622.XAA07542@netcom4.netcom.com>
Message-ID: <199604150751.AAA06516@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain



mpd@netcom.com (Mike Duvos) writes:
>one?  Also, a ballpark guess of how this result extrapolates to
>the MIPS years required to factor a 512 bit PGP key would
>probably be of interest to all.

I don't have a good guess for this, but Arjen did say that the cost to
break RSA-130 was a fraction of what it cost to break RSA-129 because
of the improved algorithm, so I'd guess we'll find out soon.  The next
target of the consortium is planned to be RSA-155, I believe, which is
above 512 bits; that means skipping RSA-140 to go for the one with the
higher psychological value.  While 512-bit PGP keys are interesting to
Cypherpunks, other 512-bit RSA keys are vitally important to some banks.

	Jim Gillogly
	Trewesday, 25 Astron S.R. 1996, 07:50





Thread