From: Tim Dierks <timd@consensus.com>
To: cypherpunks@toad.com
Message Hash: fd76c5505bbc558826dd4571f62fa997e82f6b2e973ea097e17fe0cd83c0be4c
Message ID: <v02140b00ad97b6a6eca6@[205.149.165.24]>
Reply To: N/A
UTC Datetime: 1996-04-15 11:59:11 UTC
Raw Date: Mon, 15 Apr 1996 19:59:11 +0800
From: Tim Dierks <timd@consensus.com>
Date: Mon, 15 Apr 1996 19:59:11 +0800
To: cypherpunks@toad.com
Subject: Re: RSA-130 Falls to NFS - Lenstra Posting to sci.crypt.research
Message-ID: <v02140b00ad97b6a6eca6@[205.149.165.24]>
MIME-Version: 1.0
Content-Type: text/plain
At 12:51 AM 4/15/96, Jim Gillogly wrote:
>mpd@netcom.com (Mike Duvos) writes:
>>one? Also, a ballpark guess of how this result extrapolates to
>>the MIPS years required to factor a 512 bit PGP key would
>>probably be of interest to all.
>
>I don't have a good guess for this, but Arjen did say that the cost to
>break RSA-130 was a fraction of what it cost to break RSA-129 because
>of the improved algorithm, so I'd guess we'll find out soon. The next
>target of the consortium is planned to be RSA-155, I believe, which is
>above 512 bits; that means skipping RSA-140 to go for the one with the
>higher psychological value. While 512-bit PGP keys are interesting to
>Cypherpunks, other 512-bit RSA keys are vitally important to some banks.
Also, note that 512 bits is the current exportable limit for RSA encryption.
- Tim
Tim Dierks -- timd@consensus.com -- www.consensus.com
Head of Thing-u-ma-jig Engineering, Consensus Development
Return to April 1996
Return to “Tim Dierks <timd@consensus.com>”
1996-04-15 (Mon, 15 Apr 1996 19:59:11 +0800) - Re: RSA-130 Falls to NFS - Lenstra Posting to sci.crypt.research - Tim Dierks <timd@consensus.com>