[45767] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: What ever happened to... Cray Comp/NSA co-development

daemon@ATHENA.MIT.EDU (Wei Dai)
Thu Dec 21 19:21:38 1995

Date: Thu, 21 Dec 1995 15:10:42 -0800 (PST)
From: Wei Dai <weidai@eskimo.com>
To: "Timothy C. May" <tcmay@got.net>
Cc: Cypherpunks <cypherpunks@toad.com>
In-Reply-To: <acfe321c01021004d5c5@[205.199.118.202]>

tcmay@got.net wrote:

> Not in cracking "truly large" problems by brute force. Even if each of the
> million processors is capable of 100 MIPS (which is unlikely, given the PIM
> approach and the fine-granularity, few-bit-or-less word size, etc.), this
> is only 10^8 MIPS. For problems that (for instance) 10^75 machines would
> have to spend 10^10 years on, not even a drop in an ocean.

The problem is there are still people and organizations that use 512-bit 
RSA keys.  The DOE recentedly awarded Intel a contract to build a 
computer with 9072 Pentium Pro processors.  I doubt that it will be used 
for factoring keys, but if it were, it will be able to factor a 512-bit 
number in a matter of months.

The boundary delimiting "truly large" problems and merely extremely 
expensive ones inches up all the time.  Less than a decade ago people 
thought factoring RSA-129 was a "truly large" problem.

Wei Dai

home help back first fref pref prev next nref lref last post