Recommended key size for life long key
kloecker at kde.org
Sun Sep 8 18:05:29 CEST 2013
On Sunday 08 September 2013 10:29:18 Ole Tange wrote:
> On Sun, Sep 8, 2013 at 12:06 AM, Ingo Klöcker <kloecker at kde.org>
> > On Saturday 07 September 2013 23:35:08 Ole Tange wrote:
> >> On Sat, Aug 31, 2013 at 11:46 AM, Ole Tange <tange at gnu.org> wrote:
> >> http://oletange.blogspot.dk/2013/09/life-long-key-size.html
> > but I'm pretty sure it's relevant for the
> > battery life of your and your communication partners' smart phones.
> > In particular, if you and your communication partners use equally
> > large keys and encrypt each and every email, SMS, chat message,
> > etc.
> Assuming a new smartphone runs at 1 GHz with GnuPG 2.0 then
> decryption+verify or sign+encryption will be in the order of 10
> seconds if both sender and receiver use 10kbit keys. So we are talking
> about 10 seconds per RSA encrypted message. Potentially lower if the
> phone is multicore and GnuPG's RSA implementation supports
> parallelized RSA operations.
> If RSA is only used to negotiate the initial session key, then I would
> reckon the 10 seconds is hardly noticeable from a battery
> perspective. My old Nokia N900 with wifi on will let you
> sign+encryption 657 messages with 10kbit keys on a full battery using
> GnuPG 1.4.6. With GnuPG 2.0 that would be in the order of 1000
> messages per charge.
> So where your concern really matters would be for high volume messages
> (100 per day or more) that are all RSA encrypted and are used on
> battery operated slow devices. Apart from email, can you mention any
> app that works like that today?
Some chat software (on PCs) uses GnuPG for encryption, but I'm not sure
whether they use RSA only for the initial key exchange or for every chat
message. Not having a smart phone I have no idea whether there are
similar apps for smart phones.
Having said this, in view of Snowden's disclosures, there's definitely a
need for such apps.
> If I am to include the battery perspective and speculations on what
> apps that _could_ be made, I should probably also include what would
> happen if smartphones get a cryptochip included (which would bring RSA
> operations into the millisecond range - thus rendering the battery
> concern moot).
Using a cryptochip might not only render the battery concern moot, but
this whole discussion about life long keys because even a 1mbit RSA key
is useless if the session keys created by the cryptochip are easily
guessable by the NSA.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 198 bytes
Desc: This is a digitally signed message part.
More information about the Gnupg-users