Strongest Key, Hash, and Cypher Algorithms
Johan Wevers
johanw at vulcan.xs4all.nl
Tue Feb 8 02:35:42 CET 2005
Wesley Tabadore wrote:
>How about for the asymmetric algorithms supported by GPG?
The security of RSA and DH are linked: it has been proven that an attack
faster than brute-forcing against one means the other can also be attacked
faster than brute-forcing.
Wether such an attack is possible at all seems to be an open question.
--
ir. J.C.A. Wevers // Physics and science fiction site:
johanw at vulcan.xs4all.nl // http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html
More information about the Gnupg-users
mailing list