-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
The TOR Hidden service uses 1024-bit long-term RSA key. According to this document it appears possible to break a 1024-bit RSA key in one year using a device whose cost is about $10M http://www.tau.ac.il/~tromer/papers/cbtwirl.pdf According to "FactHacks: RSA factorization in the real world" any 1024-bit key can be factored in 2^80 operations by NFS (number-field sieve). http://cr.yp.to/talks/2012.12.28/slides.pdf Feasible today for botnets and for large organizations. Will become feasible for more attackers as chips become cheaper. Is is possible to replace the 1024-bit RSA key in Hidden Services with a longer key? Or is it possible to replace it with Ed25519 ? http://ed25519.cr.yp.to/ Fedor -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJTsW0GXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4QkVFQ0NBRDcyNzU1RTk2RTQwMzlEQjc2 RTE3NDA5NTQwNTY2M0FEAAoJEG4XQJVAVmOt/x4P/1mbRivkxUNW0RCLBAtol9oN 5WWoPR9Zi4o+6k+xP7SZdi29PHPnSHYnPKzBF0mnNr9dz8ETUioSntREtj+7Y5JO wsmkT+TIapyvWY2rEijCCMvEMnKtvxbvIoSUpUYukZeRlJpm1ECw+GvmwdXvArnY YUowSjrZx5zlYX4XK8gZ5/i+R1VxByHsfGKj/h3ByhrIRRl4swzbglnnjFPZV17y x9ZgmcSeXPr4Z5QEIghJvi+rbTRGjJaj8/a/pjk9nWL/glm4y/uCgfg0/OrMYqwR DRgWuQ2ovef0FdBTGzc0DH3RJhPWEFZX/+zDlkRk5N8J5K1jm3mFwTy7xq1jCrWV BPZgI6uh2kyQ5DFLEznxKJstKsNdNnWCcmZn+PIybuoNhwK3lWpgJwV7kPApWEKU mU8h2OvplxjzeI3fOL7rx26OjvFdjYkEhUMp/LjpvrXsqtXOo9+7H7ub4dBacycS 1wtaN87tqvSb+QVBEDykE6WAG+pOpSdENO0BE4pbES9e0et8yqCQOSOZWol4gOxZ nl/ZlQULWRAODv39TvE2+aYgZGVaH1eivxGGQ/EuTesLIF/vLRbBqjjrEM2NO4G5 PTbDp9U8m/KHnJoK3+5vrCP5EgnQ/KK5bV1vFGtN6D5CH+f8nz/u4WA9nRKcD0Pj OHYbJEeqZ73tMHjxf4RH =7fgV -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk