From: Derek Atkins <warlord@MIT.EDU>
To: jim@acm.org
Message Hash: 7e1c70a2908ec3979147f5930084c4b71c3e03865ee3bf68341a7cd957bb4f51
Message ID: <199512181815.NAA15202@toxicwaste.media.mit.edu>
Reply To: <199512180550.VAA13167@mycroft.rand.org>
UTC Datetime: 1995-12-18 22:14:48 UTC
Raw Date: Tue, 19 Dec 1995 06:14:48 +0800
From: Derek Atkins <warlord@MIT.EDU>
Date: Tue, 19 Dec 1995 06:14:48 +0800
To: jim@acm.org
Subject: Re: What ever happened to... Cray Comp/NSA co-development
In-Reply-To: <199512180550.VAA13167@mycroft.rand.org>
Message-ID: <199512181815.NAA15202@toxicwaste.media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
Correction of another detail:
> > tcmay@got.net (Timothy C. May) writes:
> > When you've done this, and concluded that RSA-129 could be done in, say, X
> > minutes, then move on to RSA-384 (the BlackNet key cracked by the MIT
> > group), and on to the 1024- and 2048-bit keys. Tell us how many years or
> > centuries it will take. (Hint: Rivest and Schneier have done these
RSA-129 is 129 decimal digits, not 129 bits. This computes to about
425 bits, which is actually more difficult than the 384-bit Blacknet
key.
-derek
Return to December 1995
Return to “tcmay@got.net (Timothy C. May)”