Please note the following follow-up message on cypherpunks from
Ian Goldberg:
From: [EMAIL PROTECTED] (Ian Goldberg)
Subject: CDR: Re: 1024-bit RSA keys in danger of compromise
Date: 24 Mar 2002 18:08:32 GMT
In article 00e101c1d2d8$c9768080$c33a080a@LUCKYVAIO,
Lucky Green [EMAIL PROTECTED]
Will Knight wrote:
I'd be interested to know what people think of this story and whether
anyone is aware of any similarly unusual encryption systems.
Sounds a bit reminiscent of the steganographic spam:
http://spammimic.com/
The current implementation is not keyed so it would be very easy
On Sat, Mar 23, 2002 at 05:00:12PM -0800, Eric Young wrote:
openSSL on a PIII-633Mhz can do 265 512 bit CRT RSA per
I don't know what the OpenSSL people did to the x86 ASM code, but
SSLeay (the precursor to OpenSSL, over 3 years old) did/does 330
512bit and 55 1024 bit RSAs a second on a
IMO there are a lot of tricks and traps to get from this idea to a workable
cryptosystem. For the networks to converge they must still share some
characteristic - think of -this- characteristic as the secret key, and it
seems you have the same key distribution problem you're trying to solve.
- Original Message -
From: Lucky Green [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday, 24 March, 2002 9:38 AM
Subject: 1024-bit RSA keys in danger of compromise
[...]
In light of the above, I reluctantly revoked all my personal 1024-bit
PGP keys and the large web-of-trust that
http://technology.scmp.com/techmain/ZZZUJQ4Z6ZC.html
The fastest computer in the world has just gone on line in Japan. Called
the Earth Simulator, makers NEC Corp say the ultra-high-speed computing
system can perform 40 trillion operations per second or 40 teraflops.
The computer is designed to
http://zdnet.com.com/2102-1106-867333.html
Does it take hardware to repel pirates?
By Robert Lemos
Special to ZDNet News
March 22, 2002, 4:35 PM PT
URL: http://zdnet.com.com/2100-1106-867333.html
Software alone can't stop digital piracy, researchers said this week,
emphasizing that only a