From: gtoal@an-teallach.com (Graham Toal)
To: cypherpunks@toad.com
Message Hash: 12ad4c54d1bb076f06c68bde487c92068c3d32753d71ac361004374d3a12440f
Message ID: <199407061348.OAA03636@an-teallach.com>
Reply To: N/A
UTC Datetime: 1994-07-06 13:48:35 UTC
Raw Date: Wed, 6 Jul 94 06:48:35 PDT
From: gtoal@an-teallach.com (Graham Toal)
Date: Wed, 6 Jul 94 06:48:35 PDT
To: cypherpunks@toad.com
Subject: Re: Windows for Workgroups 3.11
Message-ID: <199407061348.OAA03636@an-teallach.com>
MIME-Version: 1.0
Content-Type: text/plain
If it really is public key, and if the keys really are quite short,
then its probably really *not* secure. Remember than a 129-digit
(~425 bit) RSA key was broken in 8 months! A 384-bit RSA key is
therefore not secure!
And if the NSA have a million-processor supercomputer, make that a couple
of hours. Thank goodness it doesn't scale with bigger keylengths!
G
Return to July 1994
Return to “gtoal@an-teallach.com (Graham Toal)”
1994-07-06 (Wed, 6 Jul 94 06:48:35 PDT) - Re: Windows for Workgroups 3.11 - gtoal@an-teallach.com (Graham Toal)