What is the practical strength of DSA1024/Elgamal2048 (former GnuPG default)?

Brian Minton brian at minton.systems
Fri Aug 30 01:02:56 CEST 2019


On Thu, Apr 25, 2019 at 11:19:15AM +0200, Kristian Fiskerstrand wrote:
> On 4/25/19 9:20 AM, Bernhard Reiter wrote:
> > Wikipedia points out a strong  sensitivity of the algorithm to the quality of 
> > random number generators and that implementations could deliberately leak 
> > information in the signature [3]. This alone probably is a reason to switch 
> > keys.
> 
> This isn't really a major point given rfc6979 (
> https://tools.ietf.org/html/rfc6979 ): Deterministic Usage of the
> Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature
> Algorithm (ECDSA)
> 

Does GnuPG use deterministic DSA / ECDSA?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20190829/f56c7432/attachment.sig>


More information about the Gnupg-users mailing list