How difficult is it to break the OpenPGP 40 character long fingerprint?

adrelanos adrelanos at
Mon Apr 1 18:24:20 CEST 2013


gpg uses only(?) 40 chars for the fingerprint.
(I mean the output of: gpg --fingerprint --keyid-format long.)

How difficult, i.e. how much computing power and time is required to
create a key, which matches the very same fingerprint?

Isn't 40 chars a bit weak?

Are there plans to provide a longer fingerprint which in theory can't be
broken with computing power expected in for example 100(0) years?


More information about the Gnupg-users mailing list