1996-08-02 - Re: Is 1024-bit PGP key enough?

Header Data

From: “Mark M.” <markm@voicenet.com>
To: gcg@pb.net>
Message Hash: b287d08b2204025e47f1695b6011005214cce514003299b6222af37af6dd745d
Message ID: <Pine.LNX.3.95.960802001105.5991A-100000@gak>
Reply To: <2.2.32.19960802021606.00697f50@mail.pb.net>
UTC Datetime: 1996-08-02 06:29:31 UTC
Raw Date: Fri, 2 Aug 1996 14:29:31 +0800

Raw message

From: "Mark M." <markm@voicenet.com>
Date: Fri, 2 Aug 1996 14:29:31 +0800
To: gcg@pb.net>
Subject: Re: Is 1024-bit PGP key enough?
In-Reply-To: <2.2.32.19960802021606.00697f50@mail.pb.net>
Message-ID: <Pine.LNX.3.95.960802001105.5991A-100000@gak>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 1 Aug 1996, Geoffrey C. Grabow wrote:

> Also, remember that although the PGP key is 1024 bits, it generates a much
> smaller IDEA key with 56 bits (I think... anyone?).  The 56 bit key is
> vunerable to that $1 mil mystery machine that the NSA may or may not have.

Nope.  The IDEA key is 128 bits long and is probably much harder to break than
a 3000-bit RSA modulus.  Of course, the comparison is really useless, since
nobody knows how advanced the NSA's factoring capabilities are.

- -- Mark

PGP encrypted mail prefered
Key fingerprint = d61734f2800486ae6f79bfeb70f95348
http://www.voicenet.com/~markm/  


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv

iQCVAwUBMgGAtrZc+sv5siulAQGDSAP9HDXWsAPMzR/WUc29OLvYs+gg78HWsewH
raZSNPP+O80Kjub/K5vmvz83b227H6wapyzOQpeVByGu+IafKi74ZTO0KhkrMLdK
FX93eY0AKFYLU/PVgxGvTsIJt1SISK5URfSLhymYVbulW/Cevute7nHvf+ZmysHy
YEY6ZQhx3Eo=
=Veh2
-----END PGP SIGNATURE-----





Thread