The current implementation of Crypto::PK::RSA::generate_key is slow and inefficient. It simply generates random values of the specified modulus length and checks if they are valid key pairs.
For modulus length of 256, or 512, this works ... all right. But when we start asking for 1024, 2048 or 4096 length key pairs, things get out of hand quickly. Tens of seconds quickly.
Pay now to fund the work behind this issue.
Get updates on progress being made.
Maintainer is rewarded once the issue is completed.
You're funding impactful open source efforts
You want to contribute to this effort
You want to get funding like this too