Robert Simmons
2012-Jun-24 18:34 UTC
Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
In light of advanced in processors and GPUs, what is the potential for duplication of RSA, DSA, and ECDSA keys at the current default key lengths (2048, 1024, and 256 respectively)?
J. Hellenthal
2012-Jun-24 18:55 UTC
Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
On Sun, Jun 24, 2012 at 02:34:45PM -0400, Robert Simmons wrote:> In light of advanced in processors and GPUs, what is the potential for > duplication of RSA, DSA, and ECDSA keys at the current default key > lengths (2048, 1024, and 256 respectively)?Just missed this one... http://en.wikipedia.org/wiki/Key_size (Value Added Link) -- - (2^(N-1))
Mark Felder
2012-Jun-24 18:56 UTC
Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmons0@gmail.com> wrote:> In light of advanced in processors and GPUs, what is the potential for > duplication of RSA, DSA, and ECDSA keys at the current default key > lengths (2048, 1024, and 256 respectively)? >I've been able to duplicate keys for years simply using cp(1) Define "duplicate". Are you asking about some sort of collision? Are you asking about brute forcing an encrypted stream and deducing what the private key is?
Dag-Erling Smørgrav
2012-Jun-24 21:18 UTC
Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
Robert Simmons <rsimmons0@gmail.com> writes:> In light of advanced in processors and GPUs, what is the potential for > duplication of RSA, DSA, and ECDSA keys at the current default key > lengths (2048, 1024, and 256 respectively)?You do know that these keys are used only for authentication, and not for encryption, right? DES -- Dag-Erling Sm?rgrav - des@des.no
Robert Simmons
2012-Jun-24 21:23 UTC
Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
On Sun, Jun 24, 2012 at 5:18 PM, Dag-Erling Sm?rgrav <des@des.no> wrote:> Robert Simmons <rsimmons0@gmail.com> writes: >> In light of advanced in processors and GPUs, what is the potential for >> duplication of RSA, DSA, and ECDSA keys at the current default key >> lengths (2048, 1024, and 256 respectively)? > > You do know that these keys are used only for authentication, and not > for encryption, right?Yes, the encryption key length is determined by which symmetric cipher is negotiated between the client and server based on what is available from the Ciphers line in sshd_config and ssh_config.