[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gnupg-users
Subject:    Re: 4096 bit keys
From:       Ingo =?iso-8859-15?q?Kl=F6cker?= <kloecker () kde ! org>
Date:       2011-03-23 19:04:57
Message-ID: 201103232004.58563 () thufir ! ingo-kloecker ! de
[Download RAW message or body]

[Attachment #2 (multipart/signed)]


On Tuesday 22 March 2011, Jerome Baum wrote:
> Jonathan Ely <thajsta@gmail.com> writes:
> > I really wish 8192 would become available. Not that it would be the
> > end all/be all of key security but according to your theory it
> > sounds much more difficult to crack.
> 
> Take that  a few steps further. Why  not use
> 99999999999999999999999-bit keys? Because they are much more
> difficult to compute. In fact if you go above a certain key size,
> since  IIRC the exponent e is standardized and thus limited, your
> discrete logarithm  is no longer discrete and so your key security
> just vanishes.
> 
> In any  case, 4096 bits will  be secure for  some time to come,  and
> yes 8192 bits would be even more secure.  We can take that as far as
> we wish but  there are  limits in  the standard,  in compatibility, 
> and  in the current implementation.

Most importantly, there are limits to the size of keys current hardware 
(in particular all of those smart phone and tablet CPUs) can handle in 
finite time. You surely do not want to wait tens of seconds to verify a 
single RSA 8192 signature.


Regards,
Ingo


["signature.asc" (application/pgp-signature)]

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic