On 12/13/2010 5:48 PM, Faramir wrote: > But supposedly, even with all these botnets, RSA-1024 has not been > broken yet. I don't know if there is some r...@home
The Berkeley BOINC framework can be pretty easily adapted to do this. > thing is breaking RSA-2048 would require about 10.000.000 times more > power than breaking RSA-1024, which -so far as we know- has not been > broken yet Off by about a factor of 100 there. RSA-2048 is roughly equivalent to a 112-bit symmetric key; RSA-1024 is roughly equivalent to an 80-bit key. 32 bits of difference equals a factor of four billion. It's way harder than you think.
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users