1995-12-18 - Re: What ever happened to… Cray Comp/NSA co-development

Header Data

From: Jim Gillogly <jim@acm.org>
To: cypherpunks@toad.com
Message Hash: c5198e617e224b1117d21edcb2884e8e44efe583c35dc0fbd53bec7c426c15b0
Message ID: <199512180550.VAA13167@mycroft.rand.org>
Reply To: <acfa2f2812021004d314@[205.199.118.202]>
UTC Datetime: 1995-12-18 07:32:02 UTC
Raw Date: Mon, 18 Dec 1995 15:32:02 +0800

Raw message

From: Jim Gillogly <jim@acm.org>
Date: Mon, 18 Dec 1995 15:32:02 +0800
To: cypherpunks@toad.com
Subject: Re: What ever happened to... Cray Comp/NSA co-development
In-Reply-To: <acfa2f2812021004d314@[205.199.118.202]>
Message-ID: <199512180550.VAA13167@mycroft.rand.org>
MIME-Version: 1.0
Content-Type: text/plain



Correction of one detail:

> tcmay@got.net (Timothy C. May) writes:
> When you've done this, and concluded that RSA-129 could be done in, say, X
> minutes, then move on to RSA-384 (the BlackNet key cracked by the MIT
> group), and on to the 1024- and 2048-bit keys. Tell us how many years or
> centuries it will take. (Hint: Rivest and Schneier have done these

The BlackNet key break didn't have any MIT involvement: it was done by
Paul Leyland of Oxford, Arjen Lenstra of Bellcore, Alec Muffet of Sun UK,
and Jim Gillogly of Cypherpunks, RAND, and Gillogly Software in no
particular order.

	Jim Gillogly
	Trewesday, 28 Foreyule S.R. 1995, 05:49





Thread