How long does it take to crack RSA 1024 with a PC?





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{
margin-bottom:0;
}
.everyonelovesstackoverflow{position:absolute;height:1px;width:1px;opacity:0;top:0;left:0;pointer-events:none;}








9












$begingroup$


Using an Intel Core i5 CPU, how long does it take to crack RSA using a key size of 1024 bit (generated using a secure key pair generation function)?



Suppose for instance that we have thousands of zombies or a big network of computers. To calculate all the combinations or possibilities, can we distribute the process through a big network of computers?










share|improve this question











$endgroup$










  • 2




    $begingroup$
    I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
    $endgroup$
    – SEJPM
    May 26 at 14:56












  • $begingroup$
    Would you please tell me where or by which formula did you get 2^{80}?
    $endgroup$
    – R1w
    May 26 at 19:26






  • 1




    $begingroup$
    it's basically rounded from crypto.stackexchange.com/a/8692/24949
    $endgroup$
    – Z.T.
    May 26 at 19:38






  • 2




    $begingroup$
    What CPU family? What clock speed? How much RAM?
    $endgroup$
    – forest
    May 26 at 23:20






  • 1




    $begingroup$
    @R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
    $endgroup$
    – forest
    May 27 at 8:15


















9












$begingroup$


Using an Intel Core i5 CPU, how long does it take to crack RSA using a key size of 1024 bit (generated using a secure key pair generation function)?



Suppose for instance that we have thousands of zombies or a big network of computers. To calculate all the combinations or possibilities, can we distribute the process through a big network of computers?










share|improve this question











$endgroup$










  • 2




    $begingroup$
    I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
    $endgroup$
    – SEJPM
    May 26 at 14:56












  • $begingroup$
    Would you please tell me where or by which formula did you get 2^{80}?
    $endgroup$
    – R1w
    May 26 at 19:26






  • 1




    $begingroup$
    it's basically rounded from crypto.stackexchange.com/a/8692/24949
    $endgroup$
    – Z.T.
    May 26 at 19:38






  • 2




    $begingroup$
    What CPU family? What clock speed? How much RAM?
    $endgroup$
    – forest
    May 26 at 23:20






  • 1




    $begingroup$
    @R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
    $endgroup$
    – forest
    May 27 at 8:15














9












9








9


3



$begingroup$


Using an Intel Core i5 CPU, how long does it take to crack RSA using a key size of 1024 bit (generated using a secure key pair generation function)?



Suppose for instance that we have thousands of zombies or a big network of computers. To calculate all the combinations or possibilities, can we distribute the process through a big network of computers?










share|improve this question











$endgroup$




Using an Intel Core i5 CPU, how long does it take to crack RSA using a key size of 1024 bit (generated using a secure key pair generation function)?



Suppose for instance that we have thousands of zombies or a big network of computers. To calculate all the combinations or possibilities, can we distribute the process through a big network of computers?







rsa cryptanalysis factoring decryption






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited May 26 at 15:34









Maarten Bodewes

59.5k7 gold badges86 silver badges216 bronze badges




59.5k7 gold badges86 silver badges216 bronze badges










asked May 26 at 14:45









R1wR1w

7452 gold badges7 silver badges30 bronze badges




7452 gold badges7 silver badges30 bronze badges











  • 2




    $begingroup$
    I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
    $endgroup$
    – SEJPM
    May 26 at 14:56












  • $begingroup$
    Would you please tell me where or by which formula did you get 2^{80}?
    $endgroup$
    – R1w
    May 26 at 19:26






  • 1




    $begingroup$
    it's basically rounded from crypto.stackexchange.com/a/8692/24949
    $endgroup$
    – Z.T.
    May 26 at 19:38






  • 2




    $begingroup$
    What CPU family? What clock speed? How much RAM?
    $endgroup$
    – forest
    May 26 at 23:20






  • 1




    $begingroup$
    @R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
    $endgroup$
    – forest
    May 27 at 8:15














  • 2




    $begingroup$
    I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
    $endgroup$
    – SEJPM
    May 26 at 14:56












  • $begingroup$
    Would you please tell me where or by which formula did you get 2^{80}?
    $endgroup$
    – R1w
    May 26 at 19:26






  • 1




    $begingroup$
    it's basically rounded from crypto.stackexchange.com/a/8692/24949
    $endgroup$
    – Z.T.
    May 26 at 19:38






  • 2




    $begingroup$
    What CPU family? What clock speed? How much RAM?
    $endgroup$
    – forest
    May 26 at 23:20






  • 1




    $begingroup$
    @R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
    $endgroup$
    – forest
    May 27 at 8:15








2




2




$begingroup$
I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
$endgroup$
– SEJPM
May 26 at 14:56






$begingroup$
I think the standard estimate is $2^{40}$ work for 512-bit moduli and $2^{80}$ work for 1024-bit. A very optimistic guesstimate would probably be "1 day" for the 512-bit modulus, so $2^{40}$ (1 trillion) days for 1024-bit moduli. Of course I didn't use actual performance numbers (so no proper answer).
$endgroup$
– SEJPM
May 26 at 14:56














$begingroup$
Would you please tell me where or by which formula did you get 2^{80}?
$endgroup$
– R1w
May 26 at 19:26




$begingroup$
Would you please tell me where or by which formula did you get 2^{80}?
$endgroup$
– R1w
May 26 at 19:26




1




1




$begingroup$
it's basically rounded from crypto.stackexchange.com/a/8692/24949
$endgroup$
– Z.T.
May 26 at 19:38




$begingroup$
it's basically rounded from crypto.stackexchange.com/a/8692/24949
$endgroup$
– Z.T.
May 26 at 19:38




2




2




$begingroup$
What CPU family? What clock speed? How much RAM?
$endgroup$
– forest
May 26 at 23:20




$begingroup$
What CPU family? What clock speed? How much RAM?
$endgroup$
– forest
May 26 at 23:20




1




1




$begingroup$
@R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
$endgroup$
– forest
May 27 at 8:15




$begingroup$
@R1w Sure, but precise hardware information is necessary to make accurate estimates. However you should assume that RSA 1024 can be broken with sufficient computing power (whether a huge number of consumer PCs or a specialized ASIC).
$endgroup$
– forest
May 27 at 8:15










1 Answer
1






active

oldest

votes


















16














$begingroup$

RSA-768 took 2000 years of 2.2Ghz single core Opteron from year 2009 [1].



DJB et al wrote in 2013 [2] that RSA-1024 would take $2^{70}$ differences with $2^{24}$ per machine per second in 2009, so 2 million years. Hardware improved since then, and GNFS can use GPUs, so maybe better, but about a million years I guess.



Absolutely the computation can be parallelized to use many devices, for example to use a botnet, which is what DJB recommends. Whether one can have a botnet with a million devices with strong CPU/GPU that use up a lot of power and not get noticed for a year, is another matter entirely.



1 - https://en.wikipedia.org/wiki/RSA_numbers#RSA-768



2 - https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf (see page 30 or slide 87 of 112 or about 10 minutes of this video https://youtu.be/95N2KXqH5cs?t=2100)






share|improve this answer











$endgroup$















  • $begingroup$
    So it makes Decryption-As-Service possible either for a legal issue or illegal.
    $endgroup$
    – R1w
    May 26 at 16:00






  • 2




    $begingroup$
    Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
    $endgroup$
    – Z.T.
    May 26 at 16:04















Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "281"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});















draft saved

draft discarded
















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f70829%2fhow-long-does-it-take-to-crack-rsa-1024-with-a-pc%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









16














$begingroup$

RSA-768 took 2000 years of 2.2Ghz single core Opteron from year 2009 [1].



DJB et al wrote in 2013 [2] that RSA-1024 would take $2^{70}$ differences with $2^{24}$ per machine per second in 2009, so 2 million years. Hardware improved since then, and GNFS can use GPUs, so maybe better, but about a million years I guess.



Absolutely the computation can be parallelized to use many devices, for example to use a botnet, which is what DJB recommends. Whether one can have a botnet with a million devices with strong CPU/GPU that use up a lot of power and not get noticed for a year, is another matter entirely.



1 - https://en.wikipedia.org/wiki/RSA_numbers#RSA-768



2 - https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf (see page 30 or slide 87 of 112 or about 10 minutes of this video https://youtu.be/95N2KXqH5cs?t=2100)






share|improve this answer











$endgroup$















  • $begingroup$
    So it makes Decryption-As-Service possible either for a legal issue or illegal.
    $endgroup$
    – R1w
    May 26 at 16:00






  • 2




    $begingroup$
    Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
    $endgroup$
    – Z.T.
    May 26 at 16:04


















16














$begingroup$

RSA-768 took 2000 years of 2.2Ghz single core Opteron from year 2009 [1].



DJB et al wrote in 2013 [2] that RSA-1024 would take $2^{70}$ differences with $2^{24}$ per machine per second in 2009, so 2 million years. Hardware improved since then, and GNFS can use GPUs, so maybe better, but about a million years I guess.



Absolutely the computation can be parallelized to use many devices, for example to use a botnet, which is what DJB recommends. Whether one can have a botnet with a million devices with strong CPU/GPU that use up a lot of power and not get noticed for a year, is another matter entirely.



1 - https://en.wikipedia.org/wiki/RSA_numbers#RSA-768



2 - https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf (see page 30 or slide 87 of 112 or about 10 minutes of this video https://youtu.be/95N2KXqH5cs?t=2100)






share|improve this answer











$endgroup$















  • $begingroup$
    So it makes Decryption-As-Service possible either for a legal issue or illegal.
    $endgroup$
    – R1w
    May 26 at 16:00






  • 2




    $begingroup$
    Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
    $endgroup$
    – Z.T.
    May 26 at 16:04
















16














16










16







$begingroup$

RSA-768 took 2000 years of 2.2Ghz single core Opteron from year 2009 [1].



DJB et al wrote in 2013 [2] that RSA-1024 would take $2^{70}$ differences with $2^{24}$ per machine per second in 2009, so 2 million years. Hardware improved since then, and GNFS can use GPUs, so maybe better, but about a million years I guess.



Absolutely the computation can be parallelized to use many devices, for example to use a botnet, which is what DJB recommends. Whether one can have a botnet with a million devices with strong CPU/GPU that use up a lot of power and not get noticed for a year, is another matter entirely.



1 - https://en.wikipedia.org/wiki/RSA_numbers#RSA-768



2 - https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf (see page 30 or slide 87 of 112 or about 10 minutes of this video https://youtu.be/95N2KXqH5cs?t=2100)






share|improve this answer











$endgroup$



RSA-768 took 2000 years of 2.2Ghz single core Opteron from year 2009 [1].



DJB et al wrote in 2013 [2] that RSA-1024 would take $2^{70}$ differences with $2^{24}$ per machine per second in 2009, so 2 million years. Hardware improved since then, and GNFS can use GPUs, so maybe better, but about a million years I guess.



Absolutely the computation can be parallelized to use many devices, for example to use a botnet, which is what DJB recommends. Whether one can have a botnet with a million devices with strong CPU/GPU that use up a lot of power and not get noticed for a year, is another matter entirely.



1 - https://en.wikipedia.org/wiki/RSA_numbers#RSA-768



2 - https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf (see page 30 or slide 87 of 112 or about 10 minutes of this video https://youtu.be/95N2KXqH5cs?t=2100)







share|improve this answer














share|improve this answer



share|improve this answer








edited May 27 at 0:04

























answered May 26 at 15:27









Z.T.Z.T.

6814 silver badges16 bronze badges




6814 silver badges16 bronze badges















  • $begingroup$
    So it makes Decryption-As-Service possible either for a legal issue or illegal.
    $endgroup$
    – R1w
    May 26 at 16:00






  • 2




    $begingroup$
    Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
    $endgroup$
    – Z.T.
    May 26 at 16:04




















  • $begingroup$
    So it makes Decryption-As-Service possible either for a legal issue or illegal.
    $endgroup$
    – R1w
    May 26 at 16:00






  • 2




    $begingroup$
    Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
    $endgroup$
    – Z.T.
    May 26 at 16:04


















$begingroup$
So it makes Decryption-As-Service possible either for a legal issue or illegal.
$endgroup$
– R1w
May 26 at 16:00




$begingroup$
So it makes Decryption-As-Service possible either for a legal issue or illegal.
$endgroup$
– R1w
May 26 at 16:00




2




2




$begingroup$
Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
$endgroup$
– Z.T.
May 26 at 16:04






$begingroup$
Yes, Nadia Heninger (co-author of that presentation I linked, cseweb.ucsd.edu/~nadiah) tried to run such a service on the public cloud. AFAIK this service doesn't exist, but anyone can create it using open source software (cado-nfs.gforge.inria.fr) and specialists can optimize the software for new hardware or to best use cloud spot instances, etc.
$endgroup$
– Z.T.
May 26 at 16:04





















draft saved

draft discarded



















































Thanks for contributing an answer to Cryptography Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


Use MathJax to format equations. MathJax reference.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f70829%2fhow-long-does-it-take-to-crack-rsa-1024-with-a-pc%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

He _____ here since 1970 . Answer needed [closed]What does “since he was so high” mean?Meaning of “catch birds for”?How do I ensure “since” takes the meaning I want?“Who cares here” meaningWhat does “right round toward” mean?the time tense (had now been detected)What does the phrase “ring around the roses” mean here?Correct usage of “visited upon”Meaning of “foiled rail sabotage bid”It was the third time I had gone to Rome or It is the third time I had been to Rome

Bunad

Færeyskur hestur Heimild | Tengill | Tilvísanir | LeiðsagnarvalRossið - síða um færeyska hrossið á færeyskuGott ár hjá færeyska hestinum