Date: Thu, 29 Aug 2002 11:52:43 -0500 From: "Dave Feustel" <dfeustel@mindspring.com> To: "Karsten W. Rohrbach" <karsten@rohrbach.de>, "Perry E. Metzger" <perry@piermont.com> Cc: <mipam@ibb.net>, "Matthias Buelow" <mkb@mukappabeta.de>, "Stefan Krüger" <skrueger@europe.com>, <freebsd-security@FreeBSD.org>, <tech-security@netbsd.org>, <misc@openbsd.org> Subject: Re: 1024 bit key considered insecure (sshd) Message-ID: <001301c24f7c$81b866c0$5892ee41@dafco6w9sb81bw> References: <20020828200748.90964.qmail@mail.com> <3D6D3953.6090005@mukappabeta.de> <20020828224330.GE249@localhost> <87k7mamc2s.fsf@snark.piermont.com> <20020829091232.A53344@mail.webmonster.de> <87bs7ln66u.fsf@snark.piermont.com> <20020829155118.B63360@mail.webmonster.de> <871y8hn43d.fsf@snark.piermont.com> <20020829183858.A68055@mail.webmonster.de>
next in thread | previous in thread | raw e-mail | index | archive | help
> > If you can attack 1024 bit keys cheaply a few months from now, please > > let us know. Where I live, Moore's law still observes things double > > every 18 months, not every 18 hours. See _Cracking DES_ (http://www.amazon.com/exec/obidos/tg/detail/-/1565925203/qid=1030639763/sr=1-1/ref=sr_1_1/102-5391104-6813765?v=glance&s=books for a (by now obsolete) low-cost home-brew system for cracking DES. The available FPGA hardware has advanced considerably since this book was written. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001301c24f7c$81b866c0$5892ee41>