From: Sten Drescher <stend@cris.com>
To: Laszlo Vecsey <master@internexus.net>
Message Hash: 162ff506b894987d288ea966e38807002ba8a7dba04eb4b34c5801a1b9bade16
Message ID: <5520ph6naq.fsf@galil.austnsc.tandem.com>
Reply To: <Pine.LNX.3.91.960103133137.3229F-100000@micro.internexus.net>
UTC Datetime: 1996-01-03 22:22:07 UTC
Raw Date: Thu, 4 Jan 1996 06:22:07 +0800
From: Sten Drescher <stend@cris.com>
Date: Thu, 4 Jan 1996 06:22:07 +0800
To: Laszlo Vecsey <master@internexus.net>
Subject: Re: 2047 bit keys in PGP
In-Reply-To: <Pine.LNX.3.91.960103133137.3229F-100000@micro.internexus.net>
Message-ID: <5520ph6naq.fsf@galil.austnsc.tandem.com>
MIME-Version: 1.0
Content-Type: text/plain
Laszlo Vecsey <master@internexus.net> said:
LV> Are you sure it's a bug in the DOS version? When I did a pgp -kg in
LV> my UNIX shell (US version 2.6.2) I also entered 2048 bits and it too
LV> created a 2047 bit key instead.
I had heard elsewhere that there was such a bug. My mistake,
then.
LV> Why is there a limit to the size of the key anyway? It's too bad PGP
LV> doesn't support any size key (within reason).
As I understand it (which, given my previous error, is in
serious doubt), after a point the IDEA session keys become far easier to
use a brute force attack on than the RSA keypair. Since I think that
increasing the RSA keysize is supposed to double the attack time, if a
RSA key size of N takes as much time to break as 1 IDEA key, making the
RSA key N+8 bits makes it better to break the IDEA keys of 200 messages
rather than the RSA key.
Does anyone know if there are comparisons of estimates of the
time to break the IDEA session keys used in PGP vs time to break RSA
keys of various sizes?
--
#include <disclaimer.h> /* Sten Drescher */
To get my PGP public key, send me email with your public key and
Subject: PGP key exchange
Key fingerprint = 90 5F 1D FD A6 7C 84 5E A9 D3 90 16 B2 44 C4 F3
Junk email is NOT appreciated. If I want to buy something, I'll find
you.
Return to January 1996
Return to “Sten Drescher <stend@cris.com>”