Strongest Key, Hash, and Cypher Algorithms

Johan Wevers johanw at
Tue Feb 8 02:35:42 CET 2005

Wesley Tabadore wrote:

>How about for the asymmetric algorithms supported by GPG?  

The security of RSA and DH are linked: it has been proven that an attack
faster than brute-forcing against one means the other can also be attacked
faster than brute-forcing.

Wether such an attack is possible at all seems to be an open question.

ir. J.C.A. Wevers         //  Physics and science fiction site:
johanw at   //
PGP/GPG public keys at

More information about the Gnupg-users mailing list