How secure is GnuPG
Daniel Carrera
dcarrera@math.toronto.edu
Tue Jul 23 21:29:01 2002
Thanks for the help. I have a few more questions.
> In any event, it is perfectly reasonable to make 2048 bit (or larger)
> RSA keys if you prefer.
Is there any drawback to using a 2048 bit key? I know that it'll take
longer to make the key the first time, but I don't care. That's a
one-time thing.
I figure that there must be some sort of tradeoff other than the original
key generation. Otherwise everyone would be using a 4096 bit key.
> It means you need to upgrade :) GnuPG 1.0.7 includes RSA key generation.
Is it actually important to upgrade?
Is it difficult to upgrade? I mean, will my current public and private
key rings still work? Will they have to be "translated" to RSA?
> > Am I safe with my 1024 bit ElGamal key?
>
> Depends who your attacker is. Unless you're concerned about a large
> government, then probably it is.
Well, if there is no loss, I can just be a little paranoid and go for an
unbreakable key.
I kind of like the idea of having a key that is beyond human technology to
break. Would a 2048 bit key be beyond our technology to factor?
Also, how complex should my passphrase be?
I chose my passphrase so that guessing it would be roughly equal to
guessing a 128-bit key. I figure that anymore would be overkill because
it'd be easier to crack the 128-bit key, and any less would compromise the
security of the 128-bit key.
Am I right?
Thanks for all the help, I do appreciate it.
Cheers,
Daniel.