1996-01-04 - Re: 2047 bit keys in PGP

Header Data

From: netdog@dog.net (netdog)
To: “Mark M.” <cypherpunks@toad.com
Message Hash: edfe08b722ed84e3b073cb1b7610b224a3b09f345823524b3a69c42f0bb6dc93
Message ID: <v02130503ad119cbfdece@[205.231.67.43]>
Reply To: N/A
UTC Datetime: 1996-01-04 15:17:45 UTC
Raw Date: Thu, 4 Jan 1996 23:17:45 +0800

Raw message

From: netdog@dog.net (netdog)
Date: Thu, 4 Jan 1996 23:17:45 +0800
To: "Mark M." <cypherpunks@toad.com
Subject: Re: 2047 bit keys in PGP
Message-ID: <v02130503ad119cbfdece@[205.231.67.43]>
MIME-Version: 1.0
Content-Type: text/plain


>I really don't see the point of using a key larger than 2048 bits.  Any larger
>key would actually be harder to factor than brute forcing the IDEA keyspace.
>Very little security would be gained from using a key larger than 3000 bits.
>Of course, one can always argue that improved factoring methods would require
>that an RSA public key be longer than 3000 bits to have equal security to
>IDEA.  However, I doubt that factoring methods will improve that much.

nobody will ever need more than 640K or RAM?  i wouldn't underestimate the
ability of technology to grow at a pace that is beyond our wildest
dreams-especially with this network serving as a virtual office/lab.  of
course, ymmv.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
the Forest will always be there...and anybody who is Friendly with Bears
can find it.


- A. A. Milne







Thread