On Sun, Jun 24, 2012 at 03:34:15PM -0400, Robert Simmons wrote: > On Sun, Jun 24, 2012 at 2:56 PM, Mark Felder <f...@feld.me> wrote: > > On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmo...@gmail.com> > > wrote: > > > >> In light of advanced in processors and GPUs, what is the potential for > >> duplication of RSA, DSA, and ECDSA keys at the current default key > >> lengths (2048, 1024, and 256 respectively)? > >> > > > > I've been able to duplicate keys for years simply using cp(1) > > > > Define "duplicate". Are you asking about some sort of collision? Are you > > asking about brute forcing an encrypted stream and deducing what the private > > key is? > > And as a flip side to the argument, is there a reason not to raise the > default to 4096? Certainly the same advances in processors makes this > size key quite usable. I've seen no noticeable slowness with 4096 bit > RSA or 521 bit ECDSA.
But what happens when the default is raised to 4096 for RSA and a server has 100, 200, 300 users ? does that processor time really get effected then ? to me this is just the cost of security but only if it is needed. Moreso what is the probabilty of communications being broken if the host key is 2048 bit RSA and the user key is 4096 bit RSA -- - (2^(N-1)) _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"