On Thu, Jan 21, 2010 at 2:24 PM, Paul Wouters <p...@xelerance.com> wrote: > On Thu, 21 Jan 2010, Edward Lewis wrote: > >> What I'd like to hear is: >> >> "Crypto-expert __________ says an RSA-SHA256 key of 1024 bits is good for >> _______ signatures/days." > > I did ask my local Waterloo based cryptographer (Ian Goldberg) this > question about a year ago for RSA-SHA1. And apart from his advise to use > RSASSA-PSS and not PKCS1-v1_5, he thought a year would be extremely safe. > I just asked another Toronto based cryptographer, Kelly Rose, the same > question, and he said he would not trust it for more then two years. > > Also, consider this paper from July 2009: > > https://documents.epfl.ch/users/l/le/lenstra/public/papers/ecdl.pdf > > Next considering special purpose hardware, the most optimistic > approach suggests that sieving for a 1024-bit RSA modulus can be > done in a year for about US $10,000,000, plus a one-time development > cost of about US $20,000,000,
And if your attacker has a budget of $1,000,000? Or $100,000,000? The point is that the numbers depend on your model of the attacker more than on the cryptography. -Ekr _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop