Re: [Fulldisclosure] nonsense fun: 100 000 bit rsa key
 From: Jeffrey Walton <noloader@xxxxxxxxx>
 Date: Sun, 29 Aug 2010 20:39:11 0400
out of boredom i generated two 100K bit rsa key in about 30 hours onOr is it morbid curiosity (it motivated me as I've never gone above 15360)....
1 core (i would be interested how long it will take generating it on openssl.
the first key is with public exponent e=2^161...Crypto++ uses e=17.
a wild guess is *at least week* if not using sophiegermainYou also might consider making the bit length a power of 2 to take
primes, otherwise much longer).
advantage of any available optimizations.
Key  Sign  VerifyShooting from the hip, it looks like you need a larger sample size
key2  48min  21min
(assuming the weights of the second key's exponents are about equal).
Crypto++ RSA key generation stats (Core 2 Duo T6500 at 2.1 GHz with
plenty of memory. The EXE was built with DNDEBUG and then strip'd.):
512 bit: 0.02 seconds
1024 bit: 0.02 seconds
2048 bit: 0.14 seconds
4096 bit: 0.81 seconds
8192 bit: 25.87 seconds
15360 bit: 4 minutes, 11.17 seconds
30720 bit: 43 minutes, 42.57 seconds
61440 bit: 11 hours, 21 minutes, 34.52 seconds
122880 bit: no dice
I'm not bitting on 100000 (its linear when plotted using logarithmic
scales). But it is impressive that you were able to generate two keys
in under 30 hours.
Jeff
On Sat, Aug 28, 2010 at 5:38 AM, Georgi Guninski <guninski@xxxxxxxxxxxx> wrote
nonsense fun: 100 000 bit rsa key
out of boredom i generated two 100K bit rsa key in about 30 hours on 1 core (i would be interested how long it will take generating it on openssl. a wild guess is *at least week* if not using sophiegermain primes, otherwise much longer).
the first key is with public exponent e=2^161, the second is with with 100Kbit e and d, the modulus is the same for both keys.
stats:
sign verify
key1 5min <1sec
key2 48min 21min
(tested on patched openssl1.0.0a)
attached are two certs + the keys, openssl needs recompilation with increased limits.
_______________________________________________
FullDisclosure  We believe in it.
Charter: http://lists.grok.org.uk/fulldisclosurecharter.html
Hosted and sponsored by Secunia  http://secunia.com/
 References:
 [Fulldisclosure] nonsense fun: 100 000 bit rsa key
 From: Georgi Guninski
 [Fulldisclosure] nonsense fun: 100 000 bit rsa key
 Prev by Date: Re: [Fulldisclosure] Security coding sequence
 Next by Date: [Fulldisclosure] ekoparty Security Conference 2010 Announcements
 Previous by thread: [Fulldisclosure] nonsense fun: 100 000 bit rsa key
 Next by thread: [Fulldisclosure] Maxthon Browser version 2.5.15.1000 Insecure DLL Hijacking Vulnerability (dwmapi.dll)
 Index(es):
Relevant Pages
