[145664] in cryptography@c2.net mail archive
2048-bit RSA keys
daemon@ATHENA.MIT.EDU (Paul Hoffman)
Sun Aug 15 21:26:38 2010
In-Reply-To: <1281890063.26393.25.camel@janus.pagansexcult.org>
Date: Sun, 15 Aug 2010 17:27:14 -0700
To: Ray Dillinger <bear@sonic.net>
From: Paul Hoffman <paul.hoffman@vpnc.org>
Cc: cryptography@metzdowd.com
At 9:34 AM -0700 8/15/10, Ray Dillinger wrote:
>I'm under the impression that <2048 keys are now insecure mostly due
>to advances in factoring algorithms that make the attack and the
>encryption effort closer to, but by no means identical to, scaling
>with the same function of key length.
You are under the wrong impression, unless you are reading vastly different crypto literature than the rest of us are. RSA-1024 *might* be possible to break in public at some point in the next decade, and RSA-2048 is a few orders of magnitude harder than that.
--Paul Hoffman, Director
--VPN Consortium
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com