what are the sub keys

Jerome Baum jerome at jeromebaum.com
Tue Mar 22 19:11:37 CET 2011


"Robert J. Hansen" <rjh at sixdemonbag.org> writes:

> On Tue, 22 Mar 2011 16:13:03 +0000, Jerome Baum <jerome at jeromebaum.com>
> wrote:
>> Correct me if I'm  wrong on this one, but it does  make your key weaker,
>> right?
>
> No.  Using SHA512 with a DSA-1K system is just as secure as, say, using
> RIPEMD160 with a DSA-1K system.  There are no known attacks against either
> hash algorithm, and when used with DSA-1K each provides 160 bits of hash.

Okay so  let's try again. Correct  me if I'm  wrong on this one,  but it
does  make  your key  weaker  _compared  with  using an  algorithm  that
supports 512 bits of hash, all else being equal_, right?

-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 880 bytes
Desc: not available
URL: </pipermail/attachments/20110322/c0031e8c/attachment.pgp>


More information about the Gnupg-users mailing list