1996-01-05 - Re: 2047 bit keys in PGP

Header Data

From: jim bell <jimbell@pacifier.com>
To: Tom Weinstein <tomw@netscape.com>
Message Hash: 5de990cc47989a6053e0ebbd1fba4d0ecd1fdc9b92eec1cbd765ee7218027245
Message ID: <m0tXzYj-00098fC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-01-05 00:53:47 UTC
Raw Date: Fri, 5 Jan 1996 08:53:47 +0800

Raw message

From: jim bell <jimbell@pacifier.com>
Date: Fri, 5 Jan 1996 08:53:47 +0800
To: Tom Weinstein <tomw@netscape.com>
Subject: Re: 2047 bit keys in PGP
Message-ID: <m0tXzYj-00098fC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


At 10:02 AM 1/4/96 -0800, you wrote:

>All that being said, I believe that 128 bits is sufficient for a
>symmetric key and 2048 for a public key.  Our paranoia would be far
>better directed at as yet unknown attacks on the algoritms involved
>or the specific implementations of cryptographic systems.  Paul Kocher's
>recent timing attack is a perfect example of what we should be afraid
>of.

Exactly!   I agree.  There is plenty of work that can be directed towards
the hardware arena, for example.  Better filters (AC, telephone, keyboard
cable), untamperable hardware (keyboards come to mind, for instance:  Design
one whose RF "signature" can't be read remotely), a push towards the use of
thin-film-type displays that don't radiate (much) in the RF spectrum,
automatic over-write of unused data areas in hard/floppy disks (including
the (unallocated) space at the ends of files), etc. 






Thread