1996-03-30 - Re: PGP Crack???

Header Data

From: mpd@netcom.com (Mike Duvos)
To: cypherpunks@toad.com
Message Hash: b28d2c84840adcdc589fbe034076b00ddc7fca7e785f44af4a61b96dadb73ff6
Message ID: <199603300650.WAA06087@netcom15.netcom.com>
Reply To: <2.2.16.19960330050617.3fdf7540@tiac.net>
UTC Datetime: 1996-03-30 10:31:57 UTC
Raw Date: Sat, 30 Mar 1996 18:31:57 +0800

Raw message

From: mpd@netcom.com (Mike Duvos)
Date: Sat, 30 Mar 1996 18:31:57 +0800
To: cypherpunks@toad.com
Subject: Re: PGP Crack???
In-Reply-To: <2.2.16.19960330050617.3fdf7540@tiac.net>
Message-ID: <199603300650.WAA06087@netcom15.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


 > This just appeared in alt.security.pgp.  Is there anything
 > to it?  I'm dubious. 

Gee - Is it April 1st again?  Time to troll the newbies in all
my favorite newsgroups. 

On a more serious note, does anyone know what is happening 
with Arjen Lenstra and RSA-130?  Last I heard back in late 
December, FAFNER, the magic WWW sieving dragon, had collected 
more than enough relations from participants to yield a 
factorization.  Surely they have not spent an additional four 
months crunching the big boolean matrix at CWI.

This is an important experiment, since it will yield a robust
estimate of the time required to break 512 bit PGP keys using
the best available factoring software.  

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     mpd@netcom.com     $    via Finger.                      $








Thread