On Sun, Jun 24, 2012 at 2:56 PM, Mark Felder <[email protected]> wrote: > On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <[email protected]> > wrote: > >> In light of advanced in processors and GPUs, what is the potential for >> duplication of RSA, DSA, and ECDSA keys at the current default key >> lengths (2048, 1024, and 256 respectively)? >> > > I've been able to duplicate keys for years simply using cp(1) > > Define "duplicate". Are you asking about some sort of collision? Are you > asking about brute forcing an encrypted stream and deducing what the private > key is?
Collisions or brute forcing an encrypted stream, either one. _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"
