Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Ichneumon
In each case the appropriate figure is 2(B2-B1), where B1 is the number of bits in the smaller key, and B2 is the number of bits in the larger key.

It's actually much less than that. The security of a key against brute force attack is proportional to the number of possible keys, not the size of a key. For RSA keys, most members of the keyspace are not valid keys since RSA keys are based on large prime numbers. An n-bit RSA key is nowhere near as secure as an n-bit conventional cipher key.
15 posted on 08/05/2004 12:05:11 AM PDT by ScuzzyTerminator
[ Post Reply | Private Reply | To 12 | View Replies ]


To: ScuzzyTerminator
It's actually much less than that. The security of a key against brute force attack is proportional to the number of possible keys, not the size of a key. For RSA keys, most members of the keyspace are not valid keys since RSA keys are based on large prime numbers. An n-bit RSA key is nowhere near as secure as an n-bit conventional cipher key.

Ah, good point, thanks for the correction. I was indeed thinking of n-bit conventional keys.

Is the number of valid 516-bit RSA keys known? It would be interesting to figure out how whether it would be feasible to pre-compute all possible keys into a "key dictionary", and then use that to brute-force test encrypted messages.

19 posted on 08/05/2004 12:11:41 AM PDT by Ichneumon ("...she might as well have been a space alien." - Bill Clinton, on Hillary, "My Life", p. 182)
[ Post Reply | Private Reply | To 15 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson