[tor-talk] Meeting Snowden in Princeton

Martijn Grooten martijn at lapsedordinary.net
Sun May 3 17:59:08 UTC 2015


On Sun, May 03, 2015 at 12:36:05AM -0400, Mansour Moufid wrote:
> "gpg ciphertexts with RSA 1024 were returned as fails"
> 
> http://cr.yp.to/factorization/batchnfs-20141109.pdf

That's an interesting paper (I wasn't aware of it and I like their
approach; thanks for sharing) but I don't think its conclusions
contractict that quote from Ross Anderson's blog post. That merely
states that the NSA doesn't have a very fast way to break RSA-1024.

It is well possible that they are using an approach similar to the one
Bernstein and Lange describe to crack the RSA-1024 private keys of
prime targets.

Martijn.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20150503/6b02e3f1/attachment.sig>


More information about the tor-talk mailing list