32768-bit key

xyz938 xyz938 at onionmail.org
Fri Aug 25 14:59:22 CEST 2023


-----BEGIN PGP MESSAGE-----

hF4DqiTMgbiu0IsSAQdAIxIXDZNcIaFZZGs3nr+2bd3yzmDQkBl7eksKX5ETqRIw
3u7QaS5QiuVOr1ZF7rKAx5hetVbe2NfvByBLs8Xw5hVI0VDGZ2/L62jf0QXnrWuk
0sAiAVNO9kiUE9BvGsvc4ksmZQ76Q7QjFysUe+flDJn5fXTM2nwE2D639PPiigRu
puCOR/YolulNzHmK0wP7XV80r4+9p7Tz3wqfOja1kODModoclYnfh+IYgC5KXxtA
VdzgFLpBh7Wnt6WYdTlIrg/YBOOh/xcAMS+apKwcd32OJgWhdodXlKkMSF5Fo6Tw
23SUsNSovl+rCkNZZXROwjfMfuXiwlyr8zB3jEi5RCNrPHWaArQfFdCNnbxz+QqU
F5a3fDJVa7A9FS96ZvQ9cYUNNZNKRPRsS2xcTwpExyMUnX9J6A==
=elyn
-----END PGP MESSAGE-----




> On Monday, 10. July 2023 1:08, Robert J. Hansen via Gnupg-users
> [/webmail/send?to=gnupg-users at gnupg.org] wrote:
> 
> 
> 
> > How do I upp the limit of the RSA-key to 32768?
> 
> First, come up with a reason why you need one.
> 
> A 2048-bit key is hypothesized to possess about 112 bits of entropy; a
> 3072-bit key, about 128; a 16k-bit, about 256. You very rapidly reach a point
> of dramatically diminishing returns. A 32k key gives you essentially nothing
> in terms of resistance to cryptanalysis, while making it impossible for the
> rest of the OpenPGP ecosystem to work with you because your public certificate
> is so unreasonably large.
> 
> > The TailsOS team has a key that's wy over 16384-bit.
> 
> I suggest filing a bug report with them and asking them why they ignore the
> best practices of cryptography.
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> https://lists.gnupg.org/mailman/listinfo/gnupg-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20230825/e4c8cd97/attachment-0001.html>
-------------- next part --------------
-----BEGIN PGP PUBLIC KEY BLOCK-----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=CXDM
-----END PGP PUBLIC KEY BLOCK-----


More information about the Gnupg-users mailing list