Mailinglist Archive: opensuse-security (757 mails)

< Previous Next >
RE: [suse-security] which cipher for ssh2
  • From: "Reckhard, Tobias" <tobias.reckhard@xxxxxxxxxxx>
  • Date: Fri, 25 Jan 2002 10:31:33 +0100
  • Message-id: <96C102324EF9D411A49500306E06C8D1A56CF3@xxxxxxxxxxxxxxxxx>
> 112 bit key = 164 years.
> 160 bit key = 46,343,912,903,694,283 years.
> 1024 =
> 57004475357125694689539104223396268823502567825415606695024759
> 37269554661513
> 85601004275993538836681954338260654082297557264046704764131857
> 21983584043465
> 91970375694235948296717285077993443876652697015567988489528438
> 55120124119935
> 5703764368040995282761394929943067804992387977103 years
>
> As you can unless NP=P, or barring some breakthrough in
> quantum computing
> key lengths should stay well ahead of brute force key
> factoring for some
> time.

I'm not out for an argument and, as I said, the 80/90 bits figure isn't from
me and it's from memory. If you want, I can forward your mail to my
colleague as a question.

Don't confuse asymettric and symmetric key lengths, though. The latter are
currently no higher than 320 bits, while those of the main proponents of the
former, namely RSA or DH/DSA, aren't lower than 512 bits and should be
1024+. RSA is worthless unless the primes are large enough.

Cheers
Tobias

< Previous Next >
Follow Ups