out of memory error during key generation

Dale Harris rodmur at maybe.org
Thu Jun 17 17:33:28 CEST 1999

On Thu, Jun 17, 1999 at 12:07:08PM +0200, Werner Koch elucidated:
>   3DES       768
>   CAST5       80
>   Blowfish  4136
>   Twofish   4256
> This is the memory needed for the key schedule and therefore it is put
> into the secure memory block.  In the long run I have to increase the
> size of this block.

I imagine that there is documentation on this, but what are relative security
of these algorithms?  Is CAST5 somehow less secure than Blowfish?  

Currently I don't have the problem of running out of secured memory, and I
think I'm using blowfish.

Dale Harris  <rodmur at maybe.org>   GPG key: 372FBD57    http://www.maybe.org/
"... I'm giving my highest recommendation to these delicious antidepressants."

More information about the Gnupg-devel mailing list