Not so much. Factoring reached 768 several years ago, and the consensus
seems to be that RSA-1024, 

and DSA and DH, is in danger within not too many years though not broken
now. And it often takes months 

or years to get new crypto, or even new keys, fully deployed especially when
you can't have a flag day,

so it's as well to start moving now. Although technically 1536 would
probably be enough for now,

pretty much everyone seems to feel as long as we're changing let's do 2048. 

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Eric S. Eberhard
Sent: Thursday, October 10, 2013 14:02
To: openssl-users@openssl.org
Cc: int0...@safe-mail.net
Subject: Re: Increasing key size from 1024 to 2048?

 

Just curious -- what line of work is your company in?  If you were CIA or
NASA or something I'd see the need.  If you are just a business -- wow!  E

On 10/10/2013 1:37 AM, int0...@safe-mail.net wrote: 

Hi,
 
<snip: as per subject>

Reply via email to