Symmetric encryption

Per Tunedal Casual pt at radvis.nu
Mon Oct 25 20:44:41 CEST 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 23:20 2004-10-24, Per Tunedal Casual wrote:
 >
 >What are the security implications? It cannot be meaningful to choose a
 >cipher that produces a longer key than the password can generate. If SHA-1
 >is the limit, then you've got 160 bits. Thus a cipher with 256 bits would
 >be overkill. If the password is used directly the calculation must be based
 >on the strength of the password used by the individual, I suppose.
 >
 >Vänligen
 >Per Tunedal

I thought once more about this :-)
It's hard enough to put up a passphrase that matches an 128 bit-key. The
hash, if any, doesn't matter, because it can hardly decrease the strength
of the passphrase,.

Thus any cipher with a key longer than 128-bits is overkill when you
encrypt symmetrically. Right?

Per Tunedal

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32) - GPGrelay v0.955
Comment: Vad är en PGP-signatur? www.clipanish.com/PGP/pgp.html

iD8DBQFBfUnFaDDfzFT+2PIRAh6eAJ0Ux1pUvVosKAPk2mLH6/Ia3RknAQCfTvMX
Nk9QL074m6uFiNcel720vsE=
=20a5
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list