From: Black Unicorn <unicorn@schloss.li>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: de5c19fc6fe83d3e4f9cb7c84168a86d7d22b6ff569c478c5dee359771740913
Message ID: <Pine.SUN.3.93.960426200445.12146G-100000@polaris.mindport.net>
Reply To: N/A
UTC Datetime: 1996-04-27 06:51:51 UTC
Raw Date: Sat, 27 Apr 1996 14:51:51 +0800
From: Black Unicorn <unicorn@schloss.li>
Date: Sat, 27 Apr 1996 14:51:51 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: RSA129
Message-ID: <Pine.SUN.3.93.960426200445.12146G-100000@polaris.mindport.net>
MIME-Version: 1.0
Content-Type: text/plain
At one point someone asked about how the breaking of RSA129 might impact
on the calculation of MIPSyears to crack a 512 bit RSA key (i.e. a PGP 512
bit key).
Was there ever an answer to this question?
Are there current guesses for 1024 and 512 bit keys out there?
---
My preferred and soon to be permanent e-mail address:unicorn@schloss.li
"In fact, had Bancroft not existed, potestas scientiae in usu est
Franklin might have had to invent him." in nihilum nil posse reverti
00B9289C28DC0E55 E16D5378B81E1C96 - Finger for Current Key Information
Opp. Counsel: For all your expert testimony needs: jimbell@pacifier.com
Return to April 1996
Return to “Wei Dai <weidai@eskimo.com>”