1994-06-23 - Re: RSA Key Size & QP

Header Data

From: NetSurfer <jdwilson@gold.chem.hawaii.edu>
To: Roger Bryner <bryner@atlas.chem.utah.edu>
Message Hash: 82370f2164a0ce88645b747cecd8739a7c5aebb105189e4288d4becd5a5fde20
Message ID: <Pine.3.07.9406230605.C5983-a100000@gold.chem.hawaii.edu>
Reply To: <Pine.3.89.9406221355.A20389-0100000@atlas.chem.utah.edu>
UTC Datetime: 1994-06-23 16:32:33 UTC
Raw Date: Thu, 23 Jun 94 09:32:33 PDT

Raw message

From: NetSurfer <jdwilson@gold.chem.hawaii.edu>
Date: Thu, 23 Jun 94 09:32:33 PDT
To: Roger Bryner <bryner@atlas.chem.utah.edu>
Subject: Re: RSA Key Size & QP
In-Reply-To: <Pine.3.89.9406221355.A20389-0100000@atlas.chem.utah.edu>
Message-ID: <Pine.3.07.9406230605.C5983-a100000@gold.chem.hawaii.edu>
MIME-Version: 1.0
Content-Type: text/plain



In the folder RSA sends out in response to inquirys they have a nice
explanation of brute-force factor-cracking estimated computation time
on several platforms at several key sizes.  I'll see if I can dig it
up (I know it's *somewhere* on my desk here...)



-NetSurfer

#include standard.disclaimer

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
==  =    = |James D. Wilson        |V.PGP 2.4:   512/E12FCD 1994/03/17 >
 "  "    " |P. O. Box 15432        |     finger for full PGP key        >
 "  " /\ " |Honolulu, HI  96830    |====================================>
\"  "/  \" |Serendipitous Solutions|    Also NetSurfer@sersol.com      >
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>













Thread