Strongest Key, Hash, and Cypher Algorithms

Wesley Tabadore wesley.tabadore at gmail.com
Sat Feb 12 23:26:57 CET 2005


> right. when you select (1) and generate a DSA/elgamal key, you're creating
> a DSA primary (signing) key with an elgamal (encryption) subkey.
> 
> if you generate an RSA key you have to add subkeys after the primary is
> generated.

If when I create the RSA key I set the capabilities to both Sign and
Encrypt, do I still need to add subkeys after creating the RSA key? 
What are the benefits if any?

I tried using the key to both sign and encrypt and it seems to work.

Thanks,

Wes


On Thu, 10 Feb 2005 01:29:37 -0500 (EST), Atom Smasher <atom at smasher.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> On Wed, 9 Feb 2005, Wesley Tabadore wrote:
> 
> > When generating keys, these are the only options:
> >
> >   (1) DSA and Elgamal (default)
> >   (2) DSA (sign only)
> >   (5) RSA (sign only)
> >
> > However, using the --expert switch, additional options are available as well:
> >
> >   (3) DSA (set your own capabilities)
> >   (7) RSA (set your own capabilities)
> >
> > If I chose #7 (RSA), I can choose whether to set the "capabilities of
> > the key as any or all of: Sign Encrypt Authenticate.
> >
> > First, why is this considered an "expert" option?  Second,
> > Authenticate is off by default when I chose #7, what is the
> > Authenticate flag used for and is there a specific reason it is off by
> > default?  Is an RSA key considered to be any more secure than a DSA
> > key?
> ===============
> 
> these are mostly questions for dave & werner. i think the expert options
> are hidden because most people never use/need them, and hiding them makes
> it easier for noobs who will use the defaults anyway.
> 
> the authenticate capability is new, and isn't really used anywhere that i
> know of. one of the things that it may be used for in the future is SSH
> authentication.
> 
> it is generally considered that DSA (and elgamal) has "more security per
> bit" than RSA, but not by a considerable margin. between a 1024 bit RSA
> key and a 1024 bit DSA key, they're both just as hard to break (for all
> practical purposes). so, since DSA is limited to 1024 bits and RSA
> isn't... well, do the math...
> 
> 
> > Lastly, when I issue a --list-keys command, after generating an RSA
> > key (using --expert), I see the following:
> >
> >             pub   4096R/D0915403 2005-02-09
> >             uid                  Wesley Tabadore <wesley.tabadore at gmail.com>
> >
> > However, after generating a DSA and Elgamal key, and then issuing the
> > --list-keys command, I get:
> >
> >             pub   1024D/A4FD0FD9 2005-02-03
> >             uid                  Wesley Tabadore <wesley.tabadore at gmail.com>
> >             sub   2048g/715F1580 2005-02-03
> >
> > There appears to be an extra key (sub).  Am I right in thiking that
> > the 1024-bit key above is for signing and the 2048-bit key is for
> > encryption?  If not, what are they for?
> ================
> 
> right. when you select (1) and generate a DSA/elgamal key, you're creating
> a DSA primary (signing) key with an elgamal (encryption) subkey.
> 
> if you generate an RSA key you have to add subkeys after the primary is
> generated.
> 
> you can use "pgpdump" to look inside a key and see what it's made of. that
> helped me greatly in understanding how this all works.
> 
> - --
>         ...atom
> 
>  _________________________________________
>  PGP key - http://atom.smasher.org/pgp.txt
>  762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
>  -------------------------------------------------
> 
>        "Men occasionally stumble over the truth,
>         but most of them pick themselves up and
>         hurry off as if nothing had happened."
>                -- Winston Churchill
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.0 (FreeBSD)
> Comment: What is this gibberish?
> Comment: http://atom.smasher.org/links/#digital_signatures
> 
> iQEcBAEBCAAGBQJCCv9WAAoJEAx/d+cTpVcic1kH/2NF9Vdemrc8WIJ9FXLkniGP
> EQbtS8qPAdjiHaxY5MxfhG1VptMtgwC8KsapvLfp9ezbaYOLBIHcUrmhmpNm0ExZ
> floseIiSPZ1UEJE2dbC3IpsvMQzVKs5kzw5fPi3Vm3oPxKnIQlO0K1E6lhERn/nC
> iUNTmojLH/KY/GZlhnZiBWrgggvqebTcizn1OBaiSrimwSzyAlYpWOKUCQGWh/6n
> Q1WGrGSWbPcayit5ZPli+doNHi5VWuGT3yJ3Y1Xtgpd+OE28xhAMyj9H1a7S2HxY
> kFZ8tbDJuV0tLmtx3euPg02Qu6KtNiA0rEbrm4zG4SNo/U16rSwOv1xqcHo65C0=
> =GSSv
> -----END PGP SIGNATURE-----
>



More information about the Gnupg-users mailing list