Strongest Key, Hash, and Cypher Algorithms
atom at smasher.org
Mon Feb 7 23:53:44 CET 2005
-----BEGIN PGP SIGNED MESSAGE-----
On Mon, 7 Feb 2005, Wesley Tabadore wrote:
> This is great information! Can you provide such an analysis for
> How about for the asymmetric algorithms supported by GPG?
> There is so much data to sort through out there, it is difficult to come
> up with the consise explanations and feedback you have given thus far.
> Would really apreciate more on the other options. :-)
i'm flattered that you like it so much, but i'm not a cryptographer.
although i have a good understanding of the protocols i actually suck
really bad at the math.
most of the information is out there, although a lot of it is dated.
i guess you could start here -
The PGP Attack FAQ
PGP DH vs. RSA FAQ
Practical Attacks on PGP
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
"All censorships exist to prevent anyone from challenging
current conceptions and existing institutions. All progress
is initiated by challenging current conceptions, and executed
by supplanting existing institutions. Consequently, the first
condition of progress is the removal of censorships."
-- George Bernard Shaw
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)
Comment: What is this gibberish?
-----END PGP SIGNATURE-----
More information about the Gnupg-users