[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Hidden service 1024-bit



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512



The TOR Hidden service uses 1024-bit long-term RSA key.

According to this document it appears possible to break a 1024-bit RSA
key in one year using a device whose cost is about $10M

http://www.tau.ac.il/~tromer/papers/cbtwirl.pdf

According to "FactHacks: RSA factorization in the real world" any
1024-bit key can be factored in 2^80 operations by NFS (number-field
sieve).
http://cr.yp.to/talks/2012.12.28/slides.pdf

Feasible today for botnets and for large organizations.
Will become feasible for more attackers as chips become cheaper.

Is is possible to replace the 1024-bit RSA key in Hidden Services with
a longer key? Or is it possible to replace it with Ed25519 ?

http://ed25519.cr.yp.to/

Fedor


-----BEGIN PGP SIGNATURE-----
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=7fgV
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk