From owner-freebsd-security Thu Aug 29 12:37:38 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id DBD0D37B400 for ; Thu, 29 Aug 2002 12:37:34 -0700 (PDT) Received: from snark.piermont.com (snark.piermont.com [166.84.151.72]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1961B43E75 for ; Thu, 29 Aug 2002 12:37:34 -0700 (PDT) (envelope-from perry@piermont.com) Received: by snark.piermont.com (Postfix, from userid 1000) id 58725D97C9; Thu, 29 Aug 2002 15:37:33 -0400 (EDT) To: "Karsten W. Rohrbach" Cc: mipam@ibb.net, Matthias Buelow , Stefan =?iso-8859-1?q?Kr=FCger?= , freebsd-security@FreeBSD.org, tech-security@netbsd.org, misc@openbsd.org Subject: Re: 1024 bit key considered insecure (sshd) References: <20020828200748.90964.qmail@mail.com> <3D6D3953.6090005@mukappabeta.de> <20020828224330.GE249@localhost> <87k7mamc2s.fsf@snark.piermont.com> <20020829091232.A53344@mail.webmonster.de> <87bs7ln66u.fsf@snark.piermont.com> <20020829155118.B63360@mail.webmonster.de> <871y8hn43d.fsf@snark.piermont.com> <20020829183858.A68055@mail.webmonster.de> From: "Perry E. Metzger" Date: 29 Aug 2002 15:37:33 -0400 In-Reply-To: <20020829183858.A68055@mail.webmonster.de> Message-ID: <87adn5zcaq.fsf@snark.piermont.com> Lines: 26 User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org "Karsten W. Rohrbach" writes: > Perry E. Metzger(perry@piermont.com)@2002.08.29 10:15:34 +0000: > > "Karsten W. Rohrbach" writes: > > > tracking the evolution of computing machinery nowadays, implementing > > > cryptanalysis in hardware becomes cheaper and faster at an amazing > > > speed. my wild guess is, that through the upcoming broad availability of > > > software programmable hardware that is available today, attacks to > > > crypto in general will become very cheap in a timeframe of months. > > > > If you can attack 1024 bit keys cheaply a few months from now, please > > let us know. Where I live, Moore's law still observes things double > > every 18 months, not every 18 hours. > > http://rcc.lanl.gov/index.php as a starting point. screw moores law, if > the problem can be parallelized. ;-) Gee, THAT is a really useful idea. Why, I bet that Xilinx will sell me FPGAs for free! That way if I want to buy ten times more, it won't cost me ten times as much! And I bet no one thought of that idea before -- why, I bet when people came up with estimates for the price of a piece of hardware to execute djb's algorithms they never thought of parallel processing at all. Perry To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message