beero1000
Veteran Member
On top of the 45mil core*years?It is 45 million core-years to pre-compute the values for a 1024 bit prime, using standard theory and hardware. Once that computation is done, any cryptographic protocol that uses the discrete-log problem (DH, PGP, TLS, HTTPS) for that specific prime is cracked.
Another way to say it: if anyone wants to read your (uncompromised) 1024 bit encrypted files, it might cost them months and many millions of dollars, but they could do it.
I think I can live with that. I mean can make my browser to generate new set of primes for every fake https gmail session and it will cost them millions each time.
No, the 45 million core years is the cost in time and money. The link argues that the cost can be reduced by a few orders of magnitude using specialized hardware, so say half a million core-years. I'd bet that the NSA already has at least one supercomputer with more than a million cores, they only cost $500 mil...
I can see why servers would like to reuse it, but client (desktop) computers can afford to generate new ones each time.The main compromising vulnerability is that even though many protocols use varying keys, they often use the same primes repeatedly, so the NSA only needs to do this for a few primes to read a large fraction of encrypted internet traffic.
These are the shared primes, not the keys. They must be agreed upon by all parties and announced in public key cryptography.