My vote is for the defaults Robert is proposing. Definitely in keeping with what else I have been reading.
Thanks, Bob Cavanaugh > -----Original Message----- > From: Gnupg-users [mailto:gnupg-users- > bounces+robertc=broadcom....@gnupg.org] On Behalf Of Robert J. > Hansen > Sent: Tuesday, March 17, 2015 12:45 PM > To: gnupg > Subject: Defaults > > Given that 2.1 introduces a lot of new capabilities (mostly with respect to > ECC), I think now, early on in the 2.1 series, would be a good time to discuss > changing the defaults for newly-generated certificates. > > In a nutshell: > > * Offer Brainpool-512 and RSA-3072 as options for > newly-generated certificates > * Use AES256 for a symmetric cipher > * Raise a warning if the user attempts to encrypt more > than 4 GiB with an old (64-bit block) cipher > * Only use CAST5 if the user explicitly requests it via > default-cipher-preferences: prefer 3DES over CAST5 > * Only use IDEA if the user explicitly requests it via > default-cipher-preferences: prefer 3DES over IDEA > * Use SHA256 for RSA-3072/-4096 signatures and SHA512 > for Brainpool-512 > > Rationale: > > * Although there's nothing per se *wrong* with the current > default of RSA-2048, realistically, 112 shannons of > uncertainty is not enough to inspire long-term confidence > * Originally, a lot of smart cards couldn't support more > than RSA-2048. While this is still true on some platforms > (it's hard to find RSA-3072 JavaCards), this does not > appear to be generally true any more. > * AES256 is a world standard for symmetric encryption and > appears to be resisting cryptanalysis better than AES128[*] > * A good rule of thumb is, "have twice as many bits of hash > as there are shannons of uncertainty in the key." RSA-3072 > provides ~128 shannons of uncertainty, hence SHA256. > Brainpool-512 provides ~256 shannons of uncertainty, hence > the recommendation for SHA512. > * CAST5 is not in good health: as was recently mentioned in > the IETF WG mailing list, the Canadians themselves still > allow it to be used for applications requiring 128 shannons > of uncertainty... but not for secrets that need to be kept > for more than a week. That doesn't inspire much confidence > in the long-term prospects of CAST5. > * Attacks on IDEA haven't been getting much better, but IDEA's > been giving me the heebie-jeebies for about fifteen years > now. I'd *really* prefer it if we got rid of it altogether. > Barring that, "only allow it to be used by explicit command" > will work for me. > * 3DES is still the Rock of Gibraltar. Big, slow, ungainly, > and strong. It's nobody's idea of a good modern cipher, but > I still think it's a better bet than IDEA or CAST5 today. > * CFB modes will potentially recycle internal states after > 2**(blocksize/2) blocks [**]. For a 64-bit block cipher, > that's 32GiB of data. Given that we now have thumb drives > larger than that, we need to consider the possibility users > will be using GnuPG as a bulk encryption tool and warn them > about potentially unsafe uses. If 2**32 blocks (32 GiB) > tends to be about the point at which we recycle state, > let's declare 4 GiB to be the point at which we warn users > against using a 64-bit block cipher. > * We've needed to make all these changes for years now. I've > always said we should defer on making big changes to the > defaults until we had ECC in place for users to migrate to. > Well, we've got ECC: let's start encouraging users to use it. > And while we're at it, let's see about making these other > overdue changes. > > > [*] As I read the tea leaves, I'm more convinced of AES256's long-term > strength than I am of AES128's. However, the idea that either one of them is > somehow 'weak' is just ludicrous. If you use AES128, don't panic. :) > > [**] Don't believe me, though. I haven't done any serious crypto work in > years and my memory could be off. I vividly recall this warning in both > _Applied Cryptography_ and the _Handbook of Applied Cryptography_, and I > think it was also given in _Practical Cryptography_ and maybe _Security > Engineering_. Check this before you believe it! > > > > Thoughts? _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users