1998-08-05 - Question on secure programs

Header Data

From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com
Message Hash: dd6f86bd4d532468a5517b3d57ffd9877582df34efb1098588f077076e477be3
Message ID: <199808050804.KAA04696@replay.com>
Reply To: N/A
UTC Datetime: 1998-08-05 08:03:54 UTC
Raw Date: Wed, 5 Aug 1998 01:03:54 -0700 (PDT)

Raw message

From: Anonymous <nobody@replay.com>
Date: Wed, 5 Aug 1998 01:03:54 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Question on secure programs
Message-ID: <199808050804.KAA04696@replay.com>
MIME-Version: 1.0
Content-Type: text/plain


I'm sitting here browsing through my copy of applied cryptography and
I start to think.  How long will my 2047 bit PGP key be secure?  When
I look for secure I don't mean my family or the occasional hacker.  I
mean like a martial law state.  DES 56bit can be cracked in days or
hours,  public key cryptography is substancially easier to break than
symetric cryptography such as DES.  I want to get the best encrytion I
can so that one day when my computer is dug out of the ground and put
in an exibit at a college they still can't break my key.  I understand
my key is secure now, but what about in ten years when I'm famous and
my history is worth a mil? :)

Is mit still developing Mit PGP? or is 2.6.2 the last free version of
PGP that we will ever see?  




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com






Thread