Date: 29 Aug 2002 10:15:34 -0400 From: "Perry E. Metzger" <perry@piermont.com> To: "Karsten W. Rohrbach" <karsten@rohrbach.de> Cc: mipam@ibb.net, Matthias Buelow <mkb@mukappabeta.de>, Stefan =?iso-8859-1?q?Kr=FCger?= <skrueger@europe.com>, freebsd-security@FreeBSD.org, tech-security@netbsd.org, misc@openbsd.org Subject: Re: 1024 bit key considered insecure (sshd) Message-ID: <871y8hn43d.fsf@snark.piermont.com> In-Reply-To: <20020829155118.B63360@mail.webmonster.de> References: <20020828200748.90964.qmail@mail.com> <3D6D3953.6090005@mukappabeta.de> <20020828224330.GE249@localhost> <87k7mamc2s.fsf@snark.piermont.com> <20020829091232.A53344@mail.webmonster.de> <87bs7ln66u.fsf@snark.piermont.com> <20020829155118.B63360@mail.webmonster.de>
next in thread | previous in thread | raw e-mail | index | archive | help
"Karsten W. Rohrbach" <karsten@rohrbach.de> writes: > tracking the evolution of computing machinery nowadays, implementing > cryptanalysis in hardware becomes cheaper and faster at an amazing > speed. my wild guess is, that through the upcoming broad availability of > software programmable hardware that is available today, attacks to > crypto in general will become very cheap in a timeframe of months. If you can attack 1024 bit keys cheaply a few months from now, please let us know. Where I live, Moore's law still observes things double every 18 months, not every 18 hours. Perry To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?871y8hn43d.fsf>