From: Paul Bradley <paul@fatmans.demon.co.uk>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: ed5cff75a963fb5da22874bd58e078f70d958cc9b829c62b11805b5773023210
Message ID: <Pine.LNX.3.91.980108150229.3198A-100000@fatmans.demon.co.uk>
Reply To: <199801062128.VAA00264@server.eternity.org>
UTC Datetime: 1998-01-09 16:20:25 UTC
Raw Date: Sat, 10 Jan 1998 00:20:25 +0800
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sat, 10 Jan 1998 00:20:25 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <Pine.LNX.3.91.980108150229.3198A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> > I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> > next factoring target.
Talking of factoring I wonder if anyone on the list has seen the article
in this months new scientist regarding a new link found between energy
levels in hydrogen atoms and generation of large primes, I don`t remember
the details (I only scanned the article as even the elementary
explanation of the physics involved was beyond me), The thrust of the
article was that work was in progress on a variant of this that could
factor large numbers significantly faster than current methods.
Anyone with more background in this sort of thing care to comment?
Datacomms Technologies data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
Return to January 1998
Return to “Paul Bradley <paul@fatmans.demon.co.uk>”