On Jul 29, 2009, at 11:14 AM, Jan Suhr wrote:

For my understanding GnuPG is standard conform and creates a "DSA
primary key (1024 bits - not "DSA2") with an Elgamal subkey per default."

It was discussed in May to change this standard to 2048-bit RSA key:
http://www.imc.org/ietf-openpgp/mail-archive/msg33227.html

I am planing to create some new keys which will be used for the next
couple of years. Therefore I am wondering if it is a good idea to create
2048-bit RSA keys already although it is not standard (yet). So
potentially it could cause incompatibility issues. I suppose most of the
correspondents (>90%) use GnuPG and thus should not have any problems
with the keys.

Do you have further information about the coming standard key type? Are
there any other obstacles or implications to consider and what is your
advice?

There is nothing particularly special about the change. RSA keys are part of the OpenPGP standard just as DSA is. The difference is that DSA is a required part of the standard, and RSA is optional. The reasons behind this are at least partly historical, and no longer apply. Nevertheless, RSA is still optional.

So yes, it is true that there could be an OpenPGP implementation out there that does not support RSA. In practice, however, I'd be very surprised if you had any problems. Even more so since you say that over 90% of your correspondents use GnuPG. Personally, I've used a RSA key since 2002 and have never had even a single instance of someone not being able to use my key because their OpenPGP program didn't implement RSA.

In short, I wouldn't worry about it. Use either DSA or RSA, and you should be fine.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to