On Sun, Jun 24, 2012 at 2:56 PM, Mark Felder <f...@feld.me> wrote: > On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmo...@gmail.com> > wrote: > >> In light of advanced in processors and GPUs, what is the potential for >> duplication of RSA, DSA, and ECDSA keys at the current default key >> lengths (2048, 1024, and 256 respectively)? >> > > I've been able to duplicate keys for years simply using cp(1) > > Define "duplicate". Are you asking about some sort of collision? Are you > asking about brute forcing an encrypted stream and deducing what the private > key is?
Collisions or brute forcing an encrypted stream, either one. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"