To: Ichneumon
In each case the appropriate figure is 2(B2-B1), where B1 is the number of bits in the smaller key, and B2 is the number of bits in the larger key.
It's actually much less than that. The security of a key against brute force attack is proportional to the number of possible keys, not the size of a key. For RSA keys, most members of the keyspace are not valid keys since RSA keys are based on large prime numbers. An n-bit RSA key is nowhere near as secure as an n-bit conventional cipher key.
To: ScuzzyTerminator
It's actually much less than that. The security of a key against brute force attack is proportional to the number of possible keys, not the size of a key. For RSA keys, most members of the keyspace are not valid keys since RSA keys are based on large prime numbers. An n-bit RSA key is nowhere near as secure as an n-bit conventional cipher key. Ah, good point, thanks for the correction. I was indeed thinking of n-bit conventional keys.
Is the number of valid 516-bit RSA keys known? It would be interesting to figure out how whether it would be feasible to pre-compute all possible keys into a "key dictionary", and then use that to brute-force test encrypted messages.
19 posted on
08/05/2004 12:11:41 AM PDT by
Ichneumon
("...she might as well have been a space alien." - Bill Clinton, on Hillary, "My Life", p. 182)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson