Some people say longer keys are silly. I think they should be supported by gpg.
Faramir
faramir.cl at gmail.com
Wed May 23 03:41:13 CEST 2012
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
El 22-05-2012 8:34, david at gbenet.com escribió:
...
> Some say that all the power of the universe - and all the time its
> been in existence will not crack a 2048 bit key with a secure
> passphrase. So by the time the universe is well and
That is about if you secret key falls in the hands of somebody
wanting to use it. But factoring your public key to obtain a working
copy of your secret key is certainly something that may be done before
the end of time, and won't require dyson spheres to power the machine.
We know one day RSA 2048 will be broken... BUT, the question is: "will
it matter to us when it happens?". Maybe I will say "Finally! I will
be able to revoke that orphan key I uploaded to keyservers when I was
learning how to use GPG... if I could remember the UID it had".
We can use RSA 2048 and wait until something stronger is available,
or we can go RSA 3072 and be even safer. Or we can even go RSA 4096,
and people will say "that's an overkill!!!", all that without
modifying GnuPG.
Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQEcBAEBCAAGBQJPvEA5AAoJEMV4f6PvczxAMwoH+wWn0YnqWTjBYe3NIvYaGQyW
oIvUsAQu5B9xVRP1wN7f0OJFKoPevcaI0pU5erAs6RGpiHmd35oLYzxGEpsCWE26
YJ37m3mBJCGRk0aOkthT6ugDJ4fEHsm5toj2si9ItJNLq2374+8GMoz++c6Vpbf/
b/y/LaWO3eeZXhtdBCC8OSYKdZiUQ1DYBBFT6WAickgYQJ+hYtRhiq2JQq9SicCA
KkWEj/NVB7esOMVoVcrQzAxbivgqKwUyGjpOVTmPlnz2lx19t3j5TAucM9Vhrsab
wfY3u4dW6T6X24Pv6WEZmyb14JgEAsK8elehU4dyRTKA+OzOAZr1ihcNOODC/Yg=
=I24B
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list