From: jim bell <jimbell@pacifier.com>
To: Tom Weinstein <tomw@netscape.com>
Message Hash: 5de990cc47989a6053e0ebbd1fba4d0ecd1fdc9b92eec1cbd765ee7218027245
Message ID: <m0tXzYj-00098fC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-01-05 00:53:47 UTC
Raw Date: Fri, 5 Jan 1996 08:53:47 +0800
From: jim bell <jimbell@pacifier.com>
Date: Fri, 5 Jan 1996 08:53:47 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: 2047 bit keys in PGP
Message-ID: <m0tXzYj-00098fC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
At 10:02 AM 1/4/96 -0800, you wrote:
>All that being said, I believe that 128 bits is sufficient for a
>symmetric key and 2048 for a public key. Our paranoia would be far
>better directed at as yet unknown attacks on the algoritms involved
>or the specific implementations of cryptographic systems. Paul Kocher's
>recent timing attack is a perfect example of what we should be afraid
>of.
Exactly! I agree. There is plenty of work that can be directed towards
the hardware arena, for example. Better filters (AC, telephone, keyboard
cable), untamperable hardware (keyboards come to mind, for instance: Design
one whose RF "signature" can't be read remotely), a push towards the use of
thin-film-type displays that don't radiate (much) in the RF spectrum,
automatic over-write of unused data areas in hard/floppy disks (including
the (unallocated) space at the ends of files), etc.
Return to January 1996
Return to “jim bell <jimbell@pacifier.com>”
1996-01-05 (Fri, 5 Jan 1996 08:53:47 +0800) - Re: 2047 bit keys in PGP - jim bell <jimbell@pacifier.com>