Re: New OpenPGP standard published

2007-11-02 Thread Ryan Malayter
On Nov 2, 2007 10:52 AM, David Shaw <[EMAIL PROTECTED]> wrote: > The new OpenPGP standard has been published. It was assigned RFC > number 4880 (someone at the IETF has a sense of humor): Is there an FAQ or other document which highlights only the changes and improvements since 2440? The output o

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Alexander W. Janssen wrote: > Apparently P and NP doesn't mean the same to you and me. P: the set of all decision problems that can be solved in polynomial time on a deterministic Turing machine. NP: the set of all decision problems that can be solved in polynomial time on a nondeterminis

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Alexander W. Janssen wrote: > A P-problem? Really?! Factoring primes is a polynomal problem nowadays? > Are you SURE about that? People who do not know what P stands for should not attempt to whap other people around with it. P is shorthand for deterministic polynomial time. NP is nondeterminist

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > Alexander W. Janssen wrote: > >> Factoring prime numbers is most definitely in P. > > > > Hold on. Earlier you say "Factoring is known to be in NP". P is much > > smaller. I'm not familiar to the latest outcomes. So what do you mean? > > If

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Sven Radde wrote: > In fact, some mathematician has proven that factoring is a polynomial > problem, IIRC. Well, we know it's in NP, since polytime verification is possible; and there are strong arguments that it cannot be NP-HARD, because then it would exist in both NP and Co-NP, which would lead

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > A good first-order approximation for the number of primes with a certain > number of bits is given by the formula: > > X = 2**number of bits > Y = 2**(number of bits - 1) > > (X ln Y - Y ln X) / ((X ln Y) * (Y ln X)) Thanks. Though I

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > Alexander W. Janssen wrote: > > A P-problem? Really?! Factoring primes is a polynomal problem nowadays? > > Are you SURE about that? > > Factoring is known to be in NP. Therefore, it is perfectly fair to say > that it's a polynomial problem

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Alexander W. Janssen wrote: > > Factoring prime numbers is most definitely in P. > > Hold on. Earlier you say "Factoring is known to be in NP". P is much > smaller. I'm not familiar to the latest outcomes. So what do you mean? If you have a proof that P is much smaller than NP, a million bucks is

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Robert J. Hansen wrote: > A keyspace of 1024 bits is double that of 1023 bits. Prime numbers s/is double/is not double/ My typo, sorry. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Sven Radde <[EMAIL PROTECTED]> wrote: > Alexander W. Janssen schrieb: > >> In fact, some mathematician has proven that factoring is a polynomial > >> problem, IIRC. > > > > A P-problem? Really?! Factoring primes is a polynomal problem nowadays? > > Are you SURE about that? > I think, I

Re: RSA Weak?

2007-11-02 Thread Sven Radde
Alexander W. Janssen schrieb: >> In fact, some mathematician has proven that factoring is a polynomial >> problem, IIRC. > > A P-problem? Really?! Factoring primes is a polynomal problem nowadays? > Are you SURE about that? Umm, no, not sure (hence the IIRC). Apparently, I am nearing an age where

Re: RSA Weak?

2007-11-02 Thread Sven Radde
Hi! Alexander W. Janssen schrieb: > How do you come to that figure? A keyspace of 1024 is the double > amount of 1023 bit, so I'm curious how you come to that figures. While this is true for symmetric ciphers, there are far more efficient attack methods on asymmetric ciphers (factoring - instead

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Alexander W. Janssen wrote: > I'm not too familiar with prime- or number-theory. Does that scale in > the same factor in all keyspaces? A good first-order approximation for the number of primes with a certain number of bits is given by the formula: X = 2**number of bits Y = 2**(number of bits

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Sven Radde <[EMAIL PROTECTED]> wrote: [...] > As mentioned above, the difficulty does not scale exponentially: The > 663-bit number took 55 CPU-years on a 2,2GHz Opteron, the 640-bit number > 30 CPU-years. The actual computations were apparrently carried out by a > cluster with 80 mach

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Alexander W. Janssen wrote: > How do you come to that figure? A keyspace of 1024 is the double > amount of 1023 bit, so I'm curious how you come to that figures. A keyspace of 1024 bits is double that of 1023 bits. Prime numbers become more scarce as they go on. For instance, there are two prime

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > Alexander W. Janssen wrote: > > How do you come to that figure? A keyspace of 1024 is the double > > amount of 1023 bit, so I'm curious how you come to that figures. > > A keyspace of 1024 bits is double that of 1023 bits. Prime numbers > b

Re: RSA Weak?

2007-11-02 Thread Alexander W. Janssen
On 11/2/07, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > RSA has never lived up to people's grand expectations. Advances in > computers and algorithms cause the sorts of RSA keys we can attack to > creep ever so gradually upwards. It's reasonable to think that within a > decade an attacker with

Re: RSA Weak?

2007-11-02 Thread Robert J. Hansen
Robert D. wrote: > Did someone write that there is some school of thought that RSA is no > longer very strong? Or, is the meaning that it's likely to take 900 > years instead of 100 years to crack? RSA has never lived up to people's grand expectations. Advances in computers and algorithms cause t

Re: New OpenPGP standard published

2007-11-02 Thread Werner Koch
On Fri, 2 Nov 2007 16:52, [EMAIL PROTECTED] said: > The new OpenPGP standard has been published. It was assigned RFC > number 4880 (someone at the IETF has a sense of humor): That's good news. The first version of OpenPGP took a bit more than a year to develop. At that time we had 3 implement

RSA Weak?

2007-11-02 Thread Robert D.
Did someone write that there is some school of thought that RSA is no longer very strong? Or, is the meaning that it's likely to take 900 years instead of 100 years to crack? Just curious. I have RSA 4096's ... could change them easily enough if someone convinced me to do it.

New OpenPGP standard published

2007-11-02 Thread David Shaw
The new OpenPGP standard has been published. It was assigned RFC number 4880 (someone at the IETF has a sense of humor): http://www.ietf.org/rfc/rfc4880.txt In terms of GnuPG, we're almost completely compliant to it already as GnuPG was updated as the various drafts of the standard were discus

Re: key-restoration problem // secret sharing

2007-11-02 Thread vedaal
>Message: 6 >Date: Thu, 1 Nov 2007 22:11:18 -0400 >From: David Shaw <[EMAIL PROTECTED]> >Subject: Re: Key safety vs Backup : History of a bad day > (key-restorationproblem) >> Paperkey extracts just those secret bytes and prints them. To >> reconstruct, you re-enter those bytes (w

Re: Key safety vs Backup : History of a bad day (key-restoration problem)

2007-11-02 Thread Roscoe
Hmm, maybe I lost my meaning in trying to avoid verbosity. If I decided my mum, dad and brother could be trusted, I'd encrypt my private key with a strong password. Then I'd use to generate 3 shares, which when combined would reveal the password to the private key. Now I'd distribute to my