How difficult is it to break the OpenPGP 40 character long fingerprint?
adrelanos at riseup.net
Mon Apr 1 18:24:20 CEST 2013
gpg uses only(?) 40 chars for the fingerprint.
(I mean the output of: gpg --fingerprint --keyid-format long.)
How difficult, i.e. how much computing power and time is required to
create a key, which matches the very same fingerprint?
Isn't 40 chars a bit weak?
Are there plans to provide a longer fingerprint which in theory can't be
broken with computing power expected in for example 100(0) years?
More information about the Gnupg-users