看板 FB_security 關於我們 聯絡資訊
On Sun, Jun 24, 2012 at 2:56 PM, Mark Felder <feld@feld.me> wrote: > On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmons0@gmail.com> > wrote: > >> In light of advanced in processors and GPUs, what is the potential for >> duplication of RSA, DSA, and ECDSA keys at the current default key >> lengths (2048, 1024, and 256 respectively)? >> > > I've been able to duplicate keys for years simply using cp(1) > > Define "duplicate". Are you asking about some sort of collision? Are you > asking about brute forcing an encrypted stream and deducing what the private > key is? Collisions or brute forcing an encrypted stream, either one. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"