1024 RSA may be compromised
Upgrade to 2048-bit, says crypto expert
According to a security debate sparked off by cryptography expert Lucky Green on Bugtraq yesterday, 1,024-bit RSA encryption should be "considered compromised".
The machine proposed by Bernstein would be able to break a 1,024-bit key in seconds to minutes. But the security implications of the practical 'breakability' of such a key run far deeper.
None of the commonly deployed systems, such as HTTPS, SSH, IPSec, S/MIME and PGP, use keys stronger than 1,024-bit, and you would be hard pushed to find vendors offering support for any more than this.
What this means, according to Green, is that "an opponent capable of breaking all of the above will have access to virtually any corporate or private communications and services that are connected to the internet".
1 billion what about a chip fab?
The price is estimated to several hundred million up to 1 billion *unless* they have or have access to a chip fab. The NSA, and nearly every intelligence agencies US and foriegn alike. Correct me if I'm wrong (and I'm sure you will), as of december 1998 there were 55 chip fabs in the US alone. It would be safe to say the NSA, and possibly itelligence agencies already have this technology in place, and the price tag was substantially lower than 1 billion.