Help


from Wikipedia
« »  
The actual degree of security achieved over time varies, as more computational power and more powerful mathematical analytic methods become available.
For this reason cryptologists tend to look at indicators that an algorithm or key length shows signs of potential vulnerability, to move to longer key sizes or more difficult algorithms.
For example, a 1039 bit integer was factored with the special number field sieve using 400 computers over 11 months.
The factored number was of a special form ; the special number field sieve cannot be used on RSA keys.
The computation is roughly equivalent to breaking a 700 bit RSA key.
However, this might be an advanced warning that 1024 bit RSA used in secure online commerce should be deprecated, since they may become breakable in the near future.
Cryptography professor Arjen Lenstra observed that " Last time, it took nine years for us to generalize from a special to a nonspecial, hard-to-factor number " and when asked whether 1024-bit RSA keys are dead, said: " The answer to that question is an unqualified yes.

1.935 seconds.