From: “Mark Grant, M.A. (Oxon)” <mark@unicorn.com>
To: cypherpunks@toad.com
Message Hash: 9bb6671b815a2c3aafc2e3b7c88df566ff23a0ca259f0b892de58e40ad6950c8
Message ID: <Pine.3.89.9601041723.A21008-0100000@unicorn.com>
Reply To: N/A
UTC Datetime: 1996-01-04 18:53:00 UTC
Raw Date: Fri, 5 Jan 1996 02:53:00 +0800
From: "Mark Grant, M.A. (Oxon)" <mark@unicorn.com>
Date: Fri, 5 Jan 1996 02:53:00 +0800
To: cypherpunks@toad.com
Subject: Re: 2047 bit keys in PGP
Message-ID: <Pine.3.89.9601041723.A21008-0100000@unicorn.com>
MIME-Version: 1.0
Content-Type: text/plain
On 4 Jan 1996, Ian Goldberg wrote:
> in a brute-force search. From Applied Crypto, 2nd ed, pp157-158,
> setting or clearing one bit takes at _least_ 4.4*10^-16 erg of energy.
I thought reversible computing could use an arbitarily small amount of
energy in computations ? Or is it that you can use it to get down to this
level of energy loss, but not below ? I'm not sure.
Mark
Return to January 1996
Return to ““Mark Grant, M.A. (Oxon)” <mark@unicorn.com>”
1996-01-04 (Fri, 5 Jan 1996 02:53:00 +0800) - Re: 2047 bit keys in PGP - “Mark Grant, M.A. (Oxon)” <mark@unicorn.com>