![]() |
|
|||||||
| View Poll Results: How will RSA-1024 be first broken (taken as an RSA public key)? | |||
| Factored by special-purpose hardware |
|
5 | 29.41% |
| Factored by a general-purpose computer/cluster |
|
9 | 52.94% |
| Broken by an attack that does not imply factoring |
|
1 | 5.88% |
| It will never be broken |
|
1 | 5.88% |
| It has already been broken |
|
1 | 5.88% |
| Voters: 17. You may not vote on this poll | |||
![]() |
|
|
Thread Tools |
|
|
#1 |
|
Mar 2006
2 Posts |
The SHARCS'06 (Special-purpose Hardware for Attacking Cryptographic System) workshop will take place in April 03-04, 2006 in Cologne, Germany.
The first SHARCS workshop took place 2005 in Paris and attracted 120 participants from industry, academia and government organization. This year too, many of the accepted papers and invited talks deal with special-purpose hardware for factoring intergers. Accepted papers: * A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp, "SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)" * P. Bulens, G. M. de Dormale and J.-J. Quisquater, "Hardware for Collision Search on Elliptic Curve over GF(2^m)" * I. Devlin, A. Purvis, "A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers" * T. Güneysu, C. Paar, J. Pelzl, "On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware" * N. Hirota, T. Izu, N. Kunihiro, K. Ohta, "An Evaluation of the Sieving Device YASD for 1024-bit Integers" * T. Kleinjung, "Cofactorisation strategies for the number field sieve and an estimate for the sieving step for factoring 1024 bit integers" * S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, A. Rupp, M. Schimmler, "How to Break DES for € 8,980" * One paper in conditional acceptance Invited talks: * Jens Franke (Rheinische Friedrich-Wilhelms Universität Bonn) * Kris Gaj (George Mason University), "Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware" * Alan Gara (BlueGene System Architect, IBM), "BlueGene/L: An overview and exploration into unique architectural features that can be exploited for cryptanalysis" * Yusuf Leblebici (École Polytechnique Fédérale de Lausanne) For further details, see: http://www.sharcs.org -- Eran Tromer |
|
|
|
|
|
#2 |
|
Mar 2006
2 Posts |
(Regarding the poll: for non-factoring attacks please assume a proper RSA padding scheme, say RSA-OAEP with SHA-512.)
|
|
|
|
|
|
#3 |
|
Jun 2003
22×11×37 Posts |
I think primegrid.org will factor the number
|
|
|
|
|
|
#4 | |
|
Oct 2004
Austria
2·17·73 Posts |
Quote:
|
|
|
|
|
|
|
#5 |
|
Jul 2004
Potsdam, Germany
83110 Posts |
What are the odds of primegrid breaking the encryption of an alien message that got received by SETI@home?
|
|
|
|
|
|
#6 |
|
Jun 2003
22×11×37 Posts |
What is the key size of the alien message, how intelligent are the aliens?
Citrix |
|
|
|
|
|
#7 |
|
Jul 2004
Potsdam, Germany
83110 Posts |
In absolute values, these factors won't change much.
|
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Talk on gpuLucas at GPGPU-4 Workshop in March | Andrew Thall | GPU Computing | 6 | 2011-02-03 14:46 |
| CADO workshop on integer factorization | akruppa | Factoring | 14 | 2008-09-18 23:52 |