From: declan@well.com (Declan McCullagh)
To: cypherpunks@toad.com
Message Hash: c385fe2d68de5de80b3f62e63ce683e45cb4f7c0f049292dc3c39a3aea3ebf1c
Message ID: <v01510100adda3101165c@[204.62.128.229]>
Reply To: N/A
UTC Datetime: 1996-06-05 02:53:50 UTC
Raw Date: Wed, 5 Jun 1996 10:53:50 +0800
From: declan@well.com (Declan McCullagh)
Date: Wed, 5 Jun 1996 10:53:50 +0800
To: cypherpunks@toad.com
Subject: How to explain crypto?
Message-ID: <v01510100adda3101165c@[204.62.128.229]>
MIME-Version: 1.0
Content-Type: text/plain
Brock, the crypto-challenged, humbly apologizes for his gaffe. He was
looking for a way to draw an understandable comparison of how much harder a
1024-bit implementation of RSA is to break than what current export
controls allow.
He's asking for suggestions on how in future articles he could word this so
a layman could understand it... Preferably something that could be said in
a few sentences. (Brock cops to the fact that it does an incredible
disservice to a complex topic. Remember, tho, he writes for a broad
audience with a way diverse range of understanding -- or misunderstanding,
as the case may be!)
For example, someone sent me this explanation:
"The 1024 bit key is likely an RSA key, and is not comperable to a 40 bit
symetric key. From memory, 1024 bit RSA is about as hard to crack as 90
bit symetric."
Is this a reasonable comparison?
-Declan
Return to June 1996
Return to ““Perry E. Metzger” <perry@piermont.com>”