4096 bit keys
Jerome Baum
jerome at jeromebaum.com
Tue Mar 22 23:14:41 CET 2011
Jonathan Ely <thajsta at gmail.com> writes:
> I really wish 8192 would become available. Not that it would be the end
> all/be all of key security but according to your theory it sounds much
> more difficult to crack.
Take that a few steps further. Why not use 99999999999999999999999-bit
keys? Because they are much more difficult to compute. In fact if you go
above a certain key size, since IIRC the exponent e is standardized and
thus limited, your discrete logarithm is no longer discrete and so your
key security just vanishes.
In any case, 4096 bits will be secure for some time to come, and yes
8192 bits would be even more secure. We can take that as far as we wish
but there are limits in the standard, in compatibility, and in the
current implementation.
--
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 880 bytes
Desc: not available
URL: </pipermail/attachments/20110322/b8d3267d/attachment.pgp>
More information about the Gnupg-users
mailing list