out of memory error during key generation
rodmur at maybe.org
Thu Jun 17 17:33:28 CEST 1999
On Thu, Jun 17, 1999 at 12:07:08PM +0200, Werner Koch elucidated:
> 3DES 768
> CAST5 80
> Blowfish 4136
> Twofish 4256
> This is the memory needed for the key schedule and therefore it is put
> into the secure memory block. In the long run I have to increase the
> size of this block.
I imagine that there is documentation on this, but what are relative security
of these algorithms? Is CAST5 somehow less secure than Blowfish?
Currently I don't have the problem of running out of secured memory, and I
think I'm using blowfish.
Dale Harris <rodmur at maybe.org> GPG key: 372FBD57 http://www.maybe.org/
"... I'm giving my highest recommendation to these delicious antidepressants."
More information about the Gnupg-devel