Key Transition Letter 2009-05-21
Robert J. Hansen
rjh at sixdemonbag.org
Sun May 24 04:15:13 CEST 2009
gpg2.20.maniams at dfgh.net wrote:
> What are the algos that are compromised ? or NOT to be used ? If this is
> too long a list
Sorry to be so late to the party --
As of this writing, no algorithm supported by GnuPG has been
compromised. Even MD5 is still on its feet.
That said, the SHA-1 and MD5 algorithms are both looking a little shaky,
and generally the recommendation seems to be to move away from those
All other algorithms supported by GnuPG are in good shape.
> I understand that choosing the key size and algo is something personal
> and others cant decide..... but I'm trying to know the choice ....
Please don't do this. The defaults are the defaults for a very good
reason: they're good defaults. With the exception of "move away from
SHA1", please do not mess around with the defaults more than you
absolutely have to.
More information about the Gnupg-users