Long Key Performance
    Werner Koch 
    wk at gnupg.org
       
    Sat Apr 20 12:51:01 CEST 2002
    
    
  
On Fri, 19 Apr 2002 11:08 -0700, Anonymous  said:
> Shouldn't decrypting time be driven by your own key size, not your
> correspondents?  Isn't that how public key works?  I have this feeling
Sure.  I usually reply and that this is a matter.
> I've used gpg on pre-Pentium hardware with 4096 bit keys.  It was
> slow, but usable.  I'm sorry that I don't have specific timing values
> available.
For me the crypto operations are too slow.
> You seem to be arguing that because you personally don't want to buy
> faster hardware, everybody else on the planet should not be permitted
> to use key lengths of their choosing.
No. It is free software. 
> Note that the attack you are positing doesn't have the same properties
> as a factoring attack.
There is no known way of factoring even a 1024 key.  And emails are
usally not a target to mount factoring attack on a personal key - if
you are capabale of doing so, you would start with widley used CA keys
or keys on backing cards.
> You seem to be claiming you know exactly how hard it is to factor.
> The fact is, however, that you don't.  Given that this is a judgment
But I know that there are hundreds of far easier ways to achieve a
goal.  Why breaking the front door when you can easily walk in through
the unlocked back door.
  Werner
    
    
More information about the Gnupg-devel
mailing list