Re: key length/size RSA discussion/recommendations in the wiki

2014-11-06 Thread Bernhard Reiter
On Friday 31 October 2014 at 18:29:21, Robert J. Hansen wrote: I agree that the FAQ is a bad place to present a chain of arguments and the wiki is the natural spot for it.  My concern is that the FAQ and the wiki need to be kept in sync somehow, and I'm not going to be watching the wiki

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-31 Thread Bernhard Reiter
Robert, On Wednesday 29 October 2014 at 19:00:39, Robert J. Hansen wrote: Because this gets asked quite often, I've started to capture some arguments of the debate how long RSAs could/should/can be at http://wiki.gnupg.org/LargeKeys I thought we largely addressed this in the FAQ, sections

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-31 Thread Robert J. Hansen
yes, I think that the recurring debate demands that the arguments are made visible so they can be tested by readers. The FAQ is discussed in public and changes are submitted to the community for comment and review before I make any changes. So far, no one on the list has raised a serious

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
Because this gets asked quite often, I've started to capture some arguments of the debate how long RSAs could/should/can be at http://wiki.gnupg.org/LargeKeys puts on his FAQ maintainer hat I thought we largely addressed this in the FAQ, sections 11.1, 11.2, 11.3, 11.4 and 11.5. Do we need

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) Sure you can. To brute-force a 128-bit RSA key would require you to check every prime number between two and 10**19. There are in the neighborhood of

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread vedaal
On 10/29/2014 at 3:22 PM, Robert J. Hansen r...@sixdemonbag.org wrote: Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) - Surely Peter knows this too ;-) More likely 128 was a typo for the more

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 21:49, ved...@nym.hush.com wrote: Surely Peter knows this too ;-) More likely 128 was a typo for the more common older RSA key of 1028 ... No, I'm using a strict definition of brute force. For p = 2^63 to 2^64-1 For q = 2^63 to 2^64-1 If p * q == n: Break Next

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
More likely 128 was a typo for the more common older RSA key of 1028 ... Either-or. RSA-1024's dangerously close to being brute-forceable, too. We've already brute-forced RSA-768 and we're closing in on RSA-890. I haven't looked into how well the general number field sieve parallelizes, but

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
No, I'm using a strict definition of brute force. Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? If you're trying to factorize 2701, for instance, you can feel free to skip dividing by 2 (doesn't end in an even

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 22:30, Robert J. Hansen wrote: Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? Well, why not restrict ourselves to primes whose product equal the modulus? I could solve any key in constant time that

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Ingo Klöcker
On Wednesday 29 October 2014 22:18:13 Peter Lebbing wrote: On 2014-10-29 21:49, ved...@nym.hush.com wrote: Surely Peter knows this too ;-) More likely 128 was a typo for the more common older RSA key of 1028 ... No, I'm using a strict definition of brute force. For p = 2^63 to