1995-12-18 - Re: What ever happened to… Cray Comp/NSA co-development

Header Data

From: Derek Atkins <warlord@MIT.EDU>
To: jim@acm.org
Message Hash: 7e1c70a2908ec3979147f5930084c4b71c3e03865ee3bf68341a7cd957bb4f51
Message ID: <199512181815.NAA15202@toxicwaste.media.mit.edu>
Reply To: <199512180550.VAA13167@mycroft.rand.org>
UTC Datetime: 1995-12-18 22:14:48 UTC
Raw Date: Tue, 19 Dec 1995 06:14:48 +0800

Raw message

From: Derek Atkins <warlord@MIT.EDU>
Date: Tue, 19 Dec 1995 06:14:48 +0800
To: jim@acm.org
Subject: Re: What ever happened to... Cray Comp/NSA co-development
In-Reply-To: <199512180550.VAA13167@mycroft.rand.org>
Message-ID: <199512181815.NAA15202@toxicwaste.media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


Correction of another detail:

> > tcmay@got.net (Timothy C. May) writes:
> > When you've done this, and concluded that RSA-129 could be done in, say, X
> > minutes, then move on to RSA-384 (the BlackNet key cracked by the MIT
> > group), and on to the 1024- and 2048-bit keys. Tell us how many years or
> > centuries it will take. (Hint: Rivest and Schneier have done these

RSA-129 is 129 decimal digits, not 129 bits.  This computes to about
425 bits, which is actually more difficult than the 384-bit Blacknet
key.

-derek





Thread