[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gnupg-devel
Subject:    Re: generating RSA key sizes > 4096
From:       "Bernd Eckenfels" <lists-gnupgdev () lina ! inka ! de>
Date:       2013-12-05 17:11:20
Message-ID: op.w7mp06k3vfogz6 () eckenfels02 ! seeburger ! de
[Download RAW message or body]

Am 05.12.2013, 02:29 Uhr, schrieb Hauke Laging  
<mailinglisten@hauke-laging.de>:
> This document is quite strange

Yes it is also not really defined what "long term" means. For example  
transactional data which contains a PII, does it need "long term"  
de-cryption protection. And it fails to differentiate between  
confidentiality and authentisity. But still the document and the  
recommendation is out there in the wild (my take away from it is however  
that they declare RSA dead end in favor of ECC, and I am not sure if that  
is a valid thing to do right now).

Nevertheless, it is a contra argument to the discussion here claiming  
there is no recommendation in that direction. After all it is also based  
on NIST projections.

Bernd
-- 
http://bernd.eckenfels.net

_______________________________________________
Gnupg-devel mailing list
Gnupg-devel@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-devel
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic