From: NetSurfer <jdwilson@gold.chem.hawaii.edu>
To: Roger Bryner <bryner@atlas.chem.utah.edu>
Message Hash: 82370f2164a0ce88645b747cecd8739a7c5aebb105189e4288d4becd5a5fde20
Message ID: <Pine.3.07.9406230605.C5983-a100000@gold.chem.hawaii.edu>
Reply To: <Pine.3.89.9406221355.A20389-0100000@atlas.chem.utah.edu>
UTC Datetime: 1994-06-23 16:32:33 UTC
Raw Date: Thu, 23 Jun 94 09:32:33 PDT
From: NetSurfer <jdwilson@gold.chem.hawaii.edu>
Date: Thu, 23 Jun 94 09:32:33 PDT
To: Roger Bryner <bryner@atlas.chem.utah.edu>
Subject: Re: RSA Key Size & QP
In-Reply-To: <Pine.3.89.9406221355.A20389-0100000@atlas.chem.utah.edu>
Message-ID: <Pine.3.07.9406230605.C5983-a100000@gold.chem.hawaii.edu>
MIME-Version: 1.0
Content-Type: text/plain
In the folder RSA sends out in response to inquirys they have a nice
explanation of brute-force factor-cracking estimated computation time
on several platforms at several key sizes. I'll see if I can dig it
up (I know it's *somewhere* on my desk here...)
-NetSurfer
#include standard.disclaimer
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
== = = |James D. Wilson |V.PGP 2.4: 512/E12FCD 1994/03/17 >
" " " |P. O. Box 15432 | finger for full PGP key >
" " /\ " |Honolulu, HI 96830 |====================================>
\" "/ \" |Serendipitous Solutions| Also NetSurfer@sersol.com >
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Return to June 1994
Return to “Roger Bryner <bryner@atlas.chem.utah.edu>”