From: “David D. W. Downey” <admin@CyberSpaceTechnologies.com>
To: Tim May <tcmay@got.net>
Message Hash: 1957b29c24686cc80d8d49e83d2ef1e1846ce6b7f64b0ebea6dc0faf1efd471c
Message ID: <XFMail.970813053156.admin@cyberspacetechnologies.com>
Reply To: <v03102800b016587f8210@[207.167.93.63]>
UTC Datetime: 1997-08-13 09:42:39 UTC
Raw Date: Wed, 13 Aug 1997 17:42:39 +0800
From: "David D. W. Downey" <admin@CyberSpaceTechnologies.com>
Date: Wed, 13 Aug 1997 17:42:39 +0800
To: Tim May <tcmay@got.net>
Subject: RE: Discussion Topic (Re: The BIG Lie (Jesus Confesses))
In-Reply-To: <v03102800b016587f8210@[207.167.93.63]>
Message-ID: <XFMail.970813053156.admin@cyberspacetechnologies.com>
MIME-Version: 1.0
Content-Type: text/plain
Even I am sick of this thread. I made an error in judgement in replying to a
letter.
I have apologized publicly to all invloved and yet this thread *still* continues
. How about we
get back to the subject this list was designed for? Here, I'll even start.
Under PGP 2.63, you are able to generate 2048 bit keys. Now, from everythin
g that I have read,
it should be impossible to break these keys even use of a Cray computer. (Estima
tes os to cost were
roughly in the neighborhood of .30 cents a minute, and approximately 1.8 years p
rocessing
time if done with a Cray. My question is this. Are there any known attacks that
have
yielded success against that level of encryption without the plaintext being kno
wn under PGP?
Also, does anyone know if the 4098 bit keys under PGP 5.0 are stronger or w
eaker? I noticed
that the alogrythm has been changed as well as the LIB used. (THe MIT version us
es the RSALIB and the
international version uses the MPLIB). It is the number of bits used that throws
me.
If the 2048 bit keys are unbreakable from 63, then why the need for 4098 bits no
w, unless there is a good
chance that the bit level is close to being broken if not broken already. That w
ould jump the
computing time and cost out of this world, considering that the cost jumps expon
entially per *bit*!
Anyone have an answer? Are the 2048 bit keys under 2.63 breakable at by the
US Government or other
such entities? Are my technical ideas behind my question correct, or do I have t
hem all wrong?
Any point in the right direction will be welcome. Thanks.
>Again, if you want discussion, discuss already.
>
>Complaining that others are not writing the articles you want to read is
>never fruitful.
>
>Probably you'll be happier doing what you said you were going to do, leaving.
>
>--Tim May
>
>There's something wrong when I'm a felon under an increasing number of laws.
>Only one response to the key grabbers is warranted: "Death to Tyrants!"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May | Crypto Anarchy: encryption, digital money,
>tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
>Higher Power: 2^1398269 | black markets, collapse of governments.
>"National borders aren't even speed bumps on the information superhighway."
----------------------------------
E-Mail: David D. W. Downey <admin@cyberspacetechnologies.com>
Date: 08/13/97
Time: 05:19:41
This message was sent by XF-Mail
----------------------------------
Return to August 1997
Return to “Tim May <tcmay@got.net>”