1024-bit RSA keys in danger of compromise

Enzo Michelangeli em at who.net
Mon Mar 25 11:21:18 EST 2002


----- Original Message -----
From: "Lucky Green" <shamrock at cypherpunks.to>
To: <cypherpunks at lne.com>
Sent: Sunday, 24 March, 2002 9:38 AM
Subject: 1024-bit RSA keys in danger of compromise


[...]
> In light of the above, I reluctantly revoked all my personal 1024-bit
> PGP keys and the large web-of-trust that these keys have acquired over
> time. The keys should be considered compromised. The revoked keys and my
> new keys are attached below.

Hmmm... I see that the new 4096-bit super-duper key, besides its own (which
doesn't prove much), only bears the signatures of the now revoked -as
potentially compromised- old keys 0x375AD924 and 0xEEE8CFF3, plus 0x06757D2D
(which turns out to be a 1024-bit DSA key) and 0x50C0FEA7 (a lowly 2048-bit
RSA legacy key)...

Are you really our Lucky, or the NSA proving our worst fears founded? ;-)

Enzo




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list