> While in principle I agree that 2048 bit key is strong enough for most > uses, comparing 3DES keys space (or any other symmetric encryption > algorithm) and RSA (or some other public key system) key space is a > bit like comparing apples and oranges. If you crack the 3DES > encryption of a message you have cracked that particular message. If > you crack the RSA key, you have cracked all messages. So the effective > key space of your public key should be larger then the key space of > the session key(s).
This is, IMHO, a complete nonissue. If your adversary has the ability to brute-force a 112-bit keyspace, then you are now living in a world where crypto cannot protect you. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users