RSA 4K

So you have your shiny new 4K TV, and you just hope that your eyes will see the difference.

RSA 4K

So you have your shiny new 4K TV, and you just hope that your eyes will see the difference.

But there a new movie in town … RSA 4K.

So the reviews for RSA 0.5K (512 bit) were bad … in fact it was a real disaster movie, and it’s still playing at a cinema near you. To stop cinemas showing it in full resolution, US export requirements made sure that it was only ever shown in 0.5K, and it’s kinda been ripped-off ever since.

For RSA 1K we raised the barrier and saw a better class of film, but it still wasn’t good enough for some cinemas, so lots of businesses went out and bought new RSA 2K equipment (just in case).

Now the industry finds out there’s a system that cracks their movies … based on quantum things … and they all need to upgrade to RSA 4K. So let’s all go and buy shares in the RSA 4K providers, as they will win big!

We review many systems for due diligence, and there’s not one system we have seen recently which bases itself on RSA. Most systems we see coming through don’t rely on SSL/TLS approaches, as they are flawed in their setup, and we increasingly see dynamic key generation for the encryption of data at its core.

At present RSA 3072 (“3K”), matches to a 128-bit AES level of security, so we need to now move up to 4K for some form of robustness, with a move towards 7K! But performance costs increase faster than key length, so will our existing systems, especially mobile/IoT devices be able to cope with these large keys.

compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -m64 -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Wformat-security -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DMD32_REG_T=int -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM
sign verify sign/s verify/s
rsa 512 bits 0.000148s 0.000010s 6778.9 96769.7
rsa 1024 bits 0.000499s 0.000029s 2005.4 34371.6
rsa 2048 bits 0.003225s 0.000100s 310.1 10036.3
rsa 4096 bits 0.023140s 0.000367s 43.2 2727.1

But, you’ll see lots of companies rushing out to buy RSA 4K (and maybe soon 7K), so it’ll be coming to a cinema near you soon. Good news for Comodo … for a one-second creation of 4K RSA keys (4,096-bit key pairs), there’s a $50 reward waiting for them!

Ever wondered what 4K looks like in crypto land (don’t you just love the way that Python just copes with Big Integers without actually tell it):

>>> i=2
>>> j=4096
>>> print (i**j)
104438888141315250669175271071662438257996424904738378038423348328395390797155745684882681193499755834089010671443926283798757343818579360726323608785136527794595697654370999834036159013438371831442807001185594622637631883939771274567233468434458661749680790870580370407128404874011860911446797778359802900668693897688178778594690563019026094059957945343282346930302669644305902501597239986771421554169383555988529148631823791443449673408781187263949647510018904134900841706167509366833385055103297208826955076998361636941193301521379682583718809183365675122131849284636812555022599830041234478486259567449219461702380650591324561082573183538008760862210283427019769820231316901767800667519548507992163641937028537512478401490715913545998279051339961155179427110683113409058427288427979155484978295432353451706522326906139490598769300212296339568778287894844061600741294567491982305057164237715481632138063104590291613692670834285644073044789997190178146576347322385026725305989979599609079946920177462481771844986745565925017832907047311943316555080756822184657174637329688491281952031745700244092661691087414838507841192980452298185733897764810312608590300130241346718972667321649151113160292078173803343609024380470834040
3154190336

That’s a BIG number!