GPG's vulnerability to quantum cryptography

Peter Lebbing peter at digitalbrains.com
Wed May 14 11:12:12 CEST 2014


On 14/05/14 09:47, Michael Anders wrote:
> Since the well known agency from Baltimore uses its influence to have
> crypto standards coast close to the limit of the brute-forceable, 128
> bit AES will be insecure not too far in the future.

Brute-forcing a 128 bits key is, as far as we know, impossible without
destroying a large part of the earth in the process.

https://www.gnupg.org/faq/gnupg-faq.html#brute_force

Also, you're really broadening from "some things are suspect" to "all things are
suspect", but let's not delve into that too deep. I might have to ask Robert how
comfortable his new asbestos longjohns are.

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>



More information about the Gnupg-users mailing list