Not so much. Factoring reached 768 several years ago, and the consensus seems to be that RSA-1024,
and DSA and DH, is in danger within not too many years though not broken now. And it often takes months or years to get new crypto, or even new keys, fully deployed especially when you can't have a flag day, so it's as well to start moving now. Although technically 1536 would probably be enough for now, pretty much everyone seems to feel as long as we're changing let's do 2048. From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Eric S. Eberhard Sent: Thursday, October 10, 2013 14:02 To: openssl-users@openssl.org Cc: int0...@safe-mail.net Subject: Re: Increasing key size from 1024 to 2048? Just curious -- what line of work is your company in? If you were CIA or NASA or something I'd see the need. If you are just a business -- wow! E On 10/10/2013 1:37 AM, int0...@safe-mail.net wrote: Hi, <snip: as per subject>