From: mpd@netcom.com (Mike Duvos)
To: cypherpunks@toad.com
Message Hash: b28d2c84840adcdc589fbe034076b00ddc7fca7e785f44af4a61b96dadb73ff6
Message ID: <199603300650.WAA06087@netcom15.netcom.com>
Reply To: <2.2.16.19960330050617.3fdf7540@tiac.net>
UTC Datetime: 1996-03-30 10:31:57 UTC
Raw Date: Sat, 30 Mar 1996 18:31:57 +0800
From: mpd@netcom.com (Mike Duvos)
Date: Sat, 30 Mar 1996 18:31:57 +0800
To: cypherpunks@toad.com
Subject: Re: PGP Crack???
In-Reply-To: <2.2.16.19960330050617.3fdf7540@tiac.net>
Message-ID: <199603300650.WAA06087@netcom15.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
> This just appeared in alt.security.pgp. Is there anything
> to it? I'm dubious.
Gee - Is it April 1st again? Time to troll the newbies in all
my favorite newsgroups.
On a more serious note, does anyone know what is happening
with Arjen Lenstra and RSA-130? Last I heard back in late
December, FAFNER, the magic WWW sieving dragon, had collected
more than enough relations from participants to yield a
factorization. Surely they have not spent an additional four
months crunching the big boolean matrix at CWI.
This is an important experiment, since it will yield a robust
estimate of the time required to break 512 bit PGP keys using
the best available factoring software.
--
Mike Duvos $ PGP 2.6 Public Key available $
mpd@netcom.com $ via Finger. $
Return to March 1996
Return to “Wei Dai <weidai@eskimo.com>”