1996-04-27 - RSA129

Header Data

From: Black Unicorn <unicorn@schloss.li>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: de5c19fc6fe83d3e4f9cb7c84168a86d7d22b6ff569c478c5dee359771740913
Message ID: <Pine.SUN.3.93.960426200445.12146G-100000@polaris.mindport.net>
Reply To: N/A
UTC Datetime: 1996-04-27 06:51:51 UTC
Raw Date: Sat, 27 Apr 1996 14:51:51 +0800

Raw message

From: Black Unicorn <unicorn@schloss.li>
Date: Sat, 27 Apr 1996 14:51:51 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: RSA129
Message-ID: <Pine.SUN.3.93.960426200445.12146G-100000@polaris.mindport.net>
MIME-Version: 1.0
Content-Type: text/plain



At one point someone asked about how the breaking of RSA129 might impact
on the calculation of MIPSyears to crack a 512 bit RSA key (i.e. a PGP 512
bit key).

Was there ever an answer to this question?

Are there current guesses for 1024 and 512 bit keys out there?


---
My preferred and soon to be permanent e-mail address:unicorn@schloss.li
"In fact, had Bancroft not existed,       potestas scientiae in usu est
Franklin might have had to invent him."    in nihilum nil posse reverti
00B9289C28DC0E55  E16D5378B81E1C96 - Finger for Current Key Information
Opp. Counsel: For all your expert testimony needs: jimbell@pacifier.com






Thread