Strongest Key, Hash, and Cypher Algorithms

Johan Wevers johanw at vulcan.xs4all.nl
Tue Feb 8 02:35:42 CET 2005


Wesley Tabadore wrote:

>How about for the asymmetric algorithms supported by GPG?  

The security of RSA and DH are linked: it has been proven that an attack
faster than brute-forcing against one means the other can also be attacked
faster than brute-forcing.

Wether such an attack is possible at all seems to be an open question.

-- 
ir. J.C.A. Wevers         //  Physics and science fiction site:
johanw at vulcan.xs4all.nl   //  http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html



More information about the Gnupg-users mailing list