Re: [Dcrup] draft-ietf-dcrup-dkim-crypto-00

"John Levine" <johnl@taugh.com> Fri, 19 May 2017 15:13 UTC

Return-Path: <johnl@taugh.com>
X-Original-To: dcrup@ietfa.amsl.com
Delivered-To: dcrup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57A8F126C3D for <dcrup@ietfa.amsl.com>; Fri, 19 May 2017 08:13:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rFd2739HW0dv for <dcrup@ietfa.amsl.com>; Fri, 19 May 2017 08:13:34 -0700 (PDT)
Received: from miucha.iecc.com (w6.iecc.com [IPv6:2001:470:1f07:1126::4945:4343]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 658C6129412 for <dcrup@ietf.org>; Fri, 19 May 2017 08:13:34 -0700 (PDT)
Received: (qmail 75221 invoked from network); 19 May 2017 15:13:33 -0000
Received: from unknown (64.57.183.18) by mail1.iecc.com with QMQP; 19 May 2017 15:13:33 -0000
Date: Fri, 19 May 2017 15:13:11 -0000
Message-ID: <20170519151311.5173.qmail@ary.lan>
From: John Levine <johnl@taugh.com>
To: dcrup@ietf.org
Cc: fenton@bluepopcorn.net
In-Reply-To: <dd14eebb-a481-0d09-5d29-a245748ac700@bluepopcorn.net>
Organization:
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset="utf-8"
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dcrup/YzyNBi9QLzCgjyCXmBBiuvyellw>
Subject: Re: [Dcrup] draft-ietf-dcrup-dkim-crypto-00
X-BeenThere: dcrup@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: DKIM Crypto Update <dcrup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dcrup>, <mailto:dcrup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dcrup/>
List-Post: <mailto:dcrup@ietf.org>
List-Help: <mailto:dcrup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dcrup>, <mailto:dcrup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 May 2017 15:13:35 -0000

In article <dd14eebb-a481-0d09-5d29-a245748ac700@bluepopcorn.net> you write:
>tl;dr: factored a 512-bit key on AWS in 72 hours for $75. But that was 5
>years ago. I haven't extrapolated to current compute costs/speeds or the
>longer key.

Doesn't the factoring effort double with every added bit?  That would
suggest that 1K keys are still impractical to factor unless you have a
great deal of money and a great deal of time.

We knew 512 bit keys were too weak in 2006, but we had (perhaps
misplaced) pity for people running beta libraries.

R's,
John