-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 22/05/12 09:58, tim.kac...@gmail.com wrote: > I think it should be okay to dredge up this topic ever couple years. From > what I am reading, links below, I do not feel comfortable with the key > length and algorithmic security offered by GPG's defaults. > > I have not been able to figure out how to get keylengths greater than 3072 > for DSA/elgmal or >4094 rsa, so I conclude that generating them is > unsupported by GPG although GPG can use them. I have seen many people > saying that these types of key lengths are way more than anyone could > reasonably need, but I am skeptical. > > I am involved in a local Occupy (bet you thought occupy was kaput eh? well > as it were known it is but that's another story) and frankly we aren't > just up against one intelligence agency, but all intel agencies put > together. An entire global class of people. You can argue that they may > be uninterested in me, however I don't buy that argument at all because > they have spent (possibly a lot) more than a thousand dollars at least on > me personally at this point I am sure in policing costs to try to > survielle and intimidate me, after you divide down. > > The eviction alone at my occupy cost (probably greatly) in excess of > $16,000 to arrest 8 people, and involved almost 200 cops for 4 hours. > There are also estimates made that in the US 1 in 6 "protestors" is > actually a government agent of one sort or another, dept of defense, > homeland security, fbi what have you. And that exludes any thugs the > bankers put in the crowd as privately hired types. > > Secondly I want my communications to remain unread into the relatively > distant future. Given the sort of crap the 1% do wrt murdering and > maiming vast quantites of people for a couple extra bucks I would not be > the least bit surprised if 20 years from now they "dissapeared" me > because I passed our some pamphlets that said "end class war now". > > An enemy is an enemy, and enemies must be smooshed, right? Why take risks > like letting an innocent person live if they might concievable scratch > your gravy train at some point in the future? Abductions and bullets > aren't that expensive once you got everything all set up, it's a good > investement. > > > I'm 23 now and I take various modest precautions to ensure that I have the > best chance I can to remain in good health when I am 43. Or 63. A couple > hundred extra milliseconds of decryption/encryption time per message for > a key longer than 3072 or 4092 sounds like a good choice frankly. Is > that not what we are looking at? > > And yes I recognize that it would be a lot easier for them to plant spyware > on my computers than break the keys, however they can't plant spyware on > everone's computer. without people noticing They do slurp up and > probably store indefinitely all text -and many other- communications on > the internet (carnivore etc.). In the future, data they don't have they > can't use. There is always a substantial probability that they will not > get my keys with spyware, and I would like capitalize (If you'll pardon > me) on that. > > Fourthly a little safety margin never hurt. > > I think it should be easier to pick longer keys. Also info should be > included in the compendium regarding practical aspects of key choice, > like a table that shows how long it takes to encrypt a symmetric key with > 2048, 4092 etc. Or event just a table in which you select your > adversary, then your time horizon, and it tells you what key lengths are > suitable, with due warnings and notes regarding the possibility of > quantum computers, mathematical advances etc. > > I understand that no matter how long the keys are it's still only a > relatively small part of the equation. However I thought it was the norm > to pick something that basically eliminated concern about the encryption > being broken, so one could forget about that part and focus on the > rest.of your security worries. > > My trust in GPG has been disturbed by this state of affairs. I thought I > could just trust the defaults but I am finding that they may not really > include the safety margin that people desire. I shudder to think of > people who are doing more serious stuff in the class war than little ol' > me (which isn't hard). > > Links: > http://en.wikipedia.org/wiki/RSA_%28algorithm%29 > -http://www.schneier.com/essay-368.html < note that this was written in 1998 > http://www.rsa.com/rsalabs/node.asp?id=2004 this one in particular makes > it clear that it is not unreasonable for someone in my position to choose > a 4096 bit key. > > > http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S. Government > requires 192 or 256-bit AES keys for highly sensitive data. A 3072 bit > RSA or elGamal key is about equivalent to 128 bit symmetric key, right? > And a 256 bit key length equivalent public key is abut 15,387 bits.. I > think if people want to use the same level of encryption for their data > that the government uses shouldn't that be supported at least in command > line mode? > http://www.win.tue.nl/~klenstra/aes_match.pdf good paper on equivalencies > in computation and cost of public key vs. symmetric. > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > Some say that all the power of the universe - and all the time its been in existence will not crack a 2048 bit key with a secure passphrase. So by the time the universe is well and truly over and some poor sod of a government agent is alive and well he will not have cracked yer e-mails or indeed any encrypted data. Can you imagine that power from a computer? No. The mind boggles at the energy it would consume - a million million million ad infinitum suns.
But they "key" to all this is them holding your private key - it would be quicker and a lot simpler to crush your balls with a pair of pliers - you will give up your most treasured possession - your passphrase. This is the meaning of brute force attacks on your key. The strength of your passphrase is critical alpha numerics take the whole universe to crack where as a phrase like: "marymary&%/*had*)/+a:+=little$£"KL$Donkey#*hadxxxabad%$*JHGbadIUNG6**leg^)andalways@#][a\|little-0UHKTwalkedUKL:@?^wonkey is a good key it will last you forever - if you can stand having your balls crushed. So the best form of security would be to invest in a sturdy steel codpiece and a long passphrase. David - -- “See the sanity of the man! No gods, no angels, no demons, no body. Nothing of the kind.Stern, sane,every brain-cell perfect and complete even at the moment of death. No delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJPu4e+AAoJEOJpqm7flRExvbwH/jQ63xJMsbTFKpwSugXEVf7E u4EhPUpBUrMGW51XYubEsEa/lJFRm9OTysG7/f33gQP27z3pKqqH0ZX9Te38e781 +CqBMdvpB18f+LBROk/21AcpErlFIqYAoDhvgmOVdNvWGKfW61GKvdcHpoitPMt3 fEOAw3qZRZZqd+fOQUt42uFWx2YCtOMdWDt3slih6TI3gq5E3/+CtXkWO41czy3g BHY61NEriOplQ+0HfrKulDsXArPRpfddN7N4kfuiAwm7kzjfitgcUdWdU/ZJE2Zp oNvQ83zjzisHFHDg1c6n4hpJzGPLQ96ox6GMj+igEIW73A/N45nWSUoMzGdsPao= =YnnX -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users