GPG's vulnerability to quantum cryptography
Peter Lebbing
peter at digitalbrains.com
Wed May 14 11:12:12 CEST 2014
On 14/05/14 09:47, Michael Anders wrote:
> Since the well known agency from Baltimore uses its influence to have
> crypto standards coast close to the limit of the brute-forceable, 128
> bit AES will be insecure not too far in the future.
Brute-forcing a 128 bits key is, as far as we know, impossible without
destroying a large part of the earth in the process.
https://www.gnupg.org/faq/gnupg-faq.html#brute_force
Also, you're really broadening from "some things are suspect" to "all things are
suspect", but let's not delve into that too deep. I might have to ask Robert how
comfortable his new asbestos longjohns are.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
More information about the Gnupg-users
mailing list