Some people say longer keys are silly. I think they should be supported by gpg.
faramir.cl at gmail.com
Wed May 23 03:41:13 CEST 2012
-----BEGIN PGP SIGNED MESSAGE-----
El 22-05-2012 8:34, david at gbenet.com escribió:
> Some say that all the power of the universe - and all the time its
> been in existence will not crack a 2048 bit key with a secure
> passphrase. So by the time the universe is well and
That is about if you secret key falls in the hands of somebody
wanting to use it. But factoring your public key to obtain a working
copy of your secret key is certainly something that may be done before
the end of time, and won't require dyson spheres to power the machine.
We know one day RSA 2048 will be broken... BUT, the question is: "will
it matter to us when it happens?". Maybe I will say "Finally! I will
be able to revoke that orphan key I uploaded to keyservers when I was
learning how to use GPG... if I could remember the UID it had".
We can use RSA 2048 and wait until something stronger is available,
or we can go RSA 3072 and be even safer. Or we can even go RSA 4096,
and people will say "that's an overkill!!!", all that without
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
-----END PGP SIGNATURE-----
More information about the Gnupg-users