A bit late for an answer, but since the other answers are purely heuristic, here are some details on why this takes so much longer:
The slowest part of RSA key generation is usually the Fermat test, which must be run for each major candidate x and consists in checking if 2 ^ {x-1} = 1 modulo x [using 2 can be done faster than using other bases]. So how does the time required for Fermat tests depend on the bit length of x?
1) The execution time of multiplication is approximately quadratic in the length of the factor bits, so doubling the length by four times increases the time (which for school multiplication, if you use Karatsuba, this will approximately triple the time, and for more sophisticated methods of multiplying the RSA bit lengths are too short).
2) The execution time of a modular exponentiation is linear along the length of the exponent bit.
3) The probability that a random n-bit number will be prime is 1: log (2 ^ n), where log is the natural logarithm, i.e. it is 1: (n * log (2)).
Thus, doubling the bit length gives you a factor of 4 from 1) and twice in 2 times from 2) and 3) for the generation time of RSA keys, therefore, in general, the operating time for Fermat tests rises 16 times (or 12 use Karatsuba) . Since there are other parts of the key generation whose uptime is not growing so fast, there is a reasonable factor of about 10, as indicated by Iridium.
source share