RE: RSA useless for encryption was: RE: RSA 1024 ridiculous

2007-06-20 Thread Brian Smith
Snoken wrote: > I checked with the source: > http://www.rsa.com/rsalabs/node.asp?id=2004 > > In 2003 users of RSA 1024-bit keys were advised to drop them > before 2010. Now the situation is somewhat worse than it > looked in 2003. That is not what the RSA website says. The website says, more-or

RSA useless for encryption was: RE: RSA 1024 ridiculous

2007-06-20 Thread Snoken
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 17:05 2007-06-16, Brian Smith wrote: >Snoken wrote: >> I suppose this means that 1024 bit RSA-keys are ridiculous >> and the Open PGP Card is a joke. And what about all web sites >> protected by SSL with a 1024-bit RSA-certificate? > >This see

Re: RSA 1024 ridiculous

2007-06-19 Thread Joseph Oreste Bruni
On Jun 19, 2007, at 7:36 AM, Andrew Berg wrote: > I wonder how many more people are going to tell me this, even after > I've demonstrated that I understand the concept (I'm pretty sure I > even signed that message!). Just think of it as "review". :) _

Re: RSA 1024 ridiculous

2007-06-19 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Joseph Oreste Bruni wrote: > On Jun 19, 2007, at 7:36 AM, Andrew Berg wrote: > >> I wonder how many more people are going to tell me this, even >> after I've demonstrated that I understand the concept (I'm pretty >> sure I even signed that messag

Re: RSA 1024 ridiculous

2007-06-19 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Janusz A. Urbanowicz wrote: > On Sun, Jun 17, 2007 at 01:02:58PM -0500, Andrew Berg wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: RIPEMD160 >> >> Atom Smasher wrote: >>> gpg does support RSA-2048/SHA-256 (or even RSA-4096/SHA-512) which

Re: RSA 1024 ridiculous

2007-06-19 Thread Janusz A. Urbanowicz
On Sun, Jun 17, 2007 at 01:02:58PM -0500, Andrew Berg wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: RIPEMD160 > > Atom Smasher wrote: > > gpg does support RSA-2048/SHA-256 (or even RSA-4096/SHA-512) which > > is what i've been using for a while now. i'll sign this email with > > RSA-2048/

Re: RSA 1024 ridiculous

2007-06-18 Thread Simon Valiquette
Atom Smasher un jour écrivit: > > On Sun, 17 Jun 2007, Remco Post wrote: >> >> Does gnupg support elliptic curve crypto? ;-) > == > > if you're paranoid about RSA, then there's no reason to go to ECC since > the math behind it is still young and uncertain. The algorithm

Re: RSA 1024 ridiculous

2007-06-18 Thread Robert Hübener
Andrew Berg wrote: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt > messages that don't even fill a cluster without breaking a sweat, but > if the sensitive data is large, RSA-4096 isn't a good choice unless a

Re: RSA 1024 ridiculous

2007-06-18 Thread Sven Radde
Hi! Andrew Berg schrieb: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt > messages that don't even fill a cluster without breaking a sweat, but > if the sensitive data is large, RSA-4096 isn't a good choice u

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread Atom Smasher
On Sun, 17 Jun 2007, David Shaw wrote: > The defaults in GnuPG are chosen to be basically sane for the > overwhelming majority of users. People who are recompiling GnuPG need > to understand the implications of the change they are making and be > aware they're throwing away that safety net. ==

Re: RSA 1024 ridiculous

2007-06-17 Thread Atom Smasher
On Sun, 17 Jun 2007, Andrew Berg wrote: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt messages > that don't even fill a cluster without breaking a sweat, but if the > sensitive data is large, RSA-4096 isn

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 06:31:15PM -0400, John W. Moore III wrote: > David Shaw wrote: > > > This year is slightly different in that I'm waiting for someone to > > discover they can also raise the key size limit for DSA. That, at > > least, is marginally less strange as I put in code to make the

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 David Shaw wrote: > This year is slightly different in that I'm waiting for someone to > discover they can also raise the key size limit for DSA. That, at > least, is marginally less strange as I put in code to make the hash > size automatically ri

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 02:24:22PM -0500, Newton Hammet wrote: > I did this before in gnupg-1.2.1 (Check the mailing list archives) > but it was a different change... I think, to a header file. (I don't > have or can no longer find the detritus from that excursion) I was > much more energetic then

Re: RSA 1024 ridiculous /8192 is sublime

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 12:41:16PM -0500, Newton Hammet wrote: > gnupg as distributed may not be generating larger than 4096 bit keys > but it is easy enough to (or was in the past) to modify the source code > in I think one place and change it to whatever you want. > > In my case I was able to su

Re: RSA 1024 ridiculous

2007-06-17 Thread Werner Koch
On Sun, 17 Jun 2007 20:02, [EMAIL PROTECTED] said: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt > messages that don't even fill a cluster without breaking a sweat, but > if the sensitive data is large, RSA-

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread Newton Hammet
On Sun, 2007-06-17 at 12:58 -0400, David Shaw wrote: > >> >>> Lot's of other stuff, not top-posted here. > GnuPG supports RSA keys much larger than 4096 bits. It does not, > however, currently allow generation of such keys, so the keys must > come from elsewhere. > > > Isn't it more usefull to s

Re: RSA 1024 ridiculous /8192 is sublime

2007-06-17 Thread Newton Hammet
gnupg as distributed may not be generating larger than 4096 bit keys but it is easy enough to (or was in the past) to modify the source code in I think one place and change it to whatever you want. In my case I was able to successfully generate a 8192-bit RSA key and tested it with encryption, dec

Re: RSA 1024 ridiculous

2007-06-17 Thread Remco Post
Andrew Berg wrote: > Robert Hübener wrote: >> The work for the RSA-part of the algorithm is always the same: It >> only has to process either the hash of the message/file or the key >> for the symmetric cipher. > I don't completely understand. Does this mean that > encryption/signature time is onl

Re: RSA 1024 ridiculous

2007-06-17 Thread Roscoe
RSA keysize will influence how long it takes you to encrypt or sign a message. But how long the RSA signing/encryption step takes is going to be the same no matter what the message length. That's because you are only ever signing a hash of the message or encrypting the symmetric session key used to

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Sven Radde wrote: > The actual "bulk" data processing is done by a symmetric algorithm > / hash function. You only encrypt the key to the symmetric > algorithm / sign the hash value. Both are typically 256bit or > smaller. > > In fact, the larger

Re: RSA 1024 ridiculous

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 01:20:17PM -0500, Andrew Berg wrote: > Robert Hübener wrote: > > Andrew Berg wrote: > >> Try signing/encrypting files that are tens, hundreds, or > >> thousands of megabytes in size. Sure, your average machine can > >> sign/encrypt messages that don't even fill a cluster wit

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Robert Hübener wrote: > Andrew Berg wrote: >> Try signing/encrypting files that are tens, hundreds, or >> thousands of megabytes in size. Sure, your average machine can >> sign/encrypt messages that don't even fill a cluster without >> breaking a

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Atom Smasher wrote: > gpg does support RSA-2048/SHA-256 (or even RSA-4096/SHA-512) which > is what i've been using for a while now. i'll sign this email with > RSA-2048/SHA-256 (my default on this key) just to show what it > looks like. it's a

Re: RSA 1024 ridiculous

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 11:14:35AM +0200, Crest wrote: > Am 16.06.2007 um 17:05 schrieb Brian Smith: > > > IF you have a life-long digital secret that you want to protect from > > people with hundreds of millions of dollars to spend, and you > > insist on > > using RSA public key encryption to p

Re: RSA 1024 ridiculous

2007-06-17 Thread Atom Smasher
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, 17 Jun 2007, Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) == if you're paranoid about RSA, then there's no reason to go to ECC since the math behind it is still young and uncertain. while a 1024 bit

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) I found this link on the Wikipedia page: http://www.calcurco.cat/eccGnuPG/index.en.html - -- Windows NT 5.1.2600.2180 | Thunderbird 2.0.0.4 | Enigmail 0.95.1 | GPG 1.4.7 Key ID: 0

Re: RSA 1024 ridiculous

2007-06-17 Thread Benjamin Donnachie
Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) Not yet... Ben ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: RSA 1024 ridiculous

2007-06-17 Thread Remco Post
Crest wrote: > > Isn't it more usefull to switch to ECC instead of using that large keys? Does gnupg support elliptic curve crypto? ;-) -- Met vriendelijke groeten, Remco Post SARA - Reken- en Netwerkdiensten http://www.sara.nl High Performance Computing Tel. +31 20 592

Re: RSA 1024 ridiculous

2007-06-17 Thread Crest
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Am 16.06.2007 um 17:05 schrieb Brian Smith: > IF you have a life-long digital secret that you want to protect from > people with hundreds of millions of dollars to spend, and you > insist on > using RSA public key encryption to protect it during t

Re: RSA 1024 ridiculous

2007-06-16 Thread Stef Caunter
On Sat, 16 Jun 2007, Snoken wrote: > I suppose this means that 1024 bit RSA-keys are ridiculous and the > Open PGP Card is a joke. And what about all web sites protected by > SSL with a 1024-bit RSA-certificate? The only thing that is ridiculous is this flame-bait language. Feel the freedom to p

Re: RSA 1024 ridiculous

2007-06-16 Thread Benjamin Donnachie
Andrew Berg wrote: > Anyone who's worried about an entity with the power needed to break > their messages in time to make any use of it has probably already been > using a longer key size for a while now. Or, more likely for someone that paranoid, a one time pad. Ben

Re: RSA 1024 ridiculous

2007-06-16 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Snoken wrote: > Hi, I just read the latest CRYPTO-GRAM, June 15, 2007, by Bruce > Schneier. He writes: > > "We have a new factoring record: 307 digits (1023 bits). It's a > special number -- 2^1039 - 1 -- but the techniques can be > generalized

Re: RSA 1024 ridiculous

2007-06-16 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 I'll get back to this bit in a moment. ;) > I suppose this means that 1024 bit RSA-keys are ridiculous and the > Open PGP Card is a joke. Not necessarily. There's certainly a strong argument to b

RE: RSA 1024 ridiculous

2007-06-16 Thread Brian Smith
Snoken wrote: > I suppose this means that 1024 bit RSA-keys are ridiculous > and the Open PGP Card is a joke. And what about all web sites > protected by SSL with a 1024-bit RSA-certificate? This seems to be more-or-less on schedule: http://en.wikipedia.org/wiki/Key_size#Asymmetric_algorithm_key

Re: RSA 1024 ridiculous

2007-06-16 Thread Remco Post
Snoken wrote: > Hi, > I just read the latest CRYPTO-GRAM, June 15, 2007, by Bruce Schneier. > He writes: > > "We have a new factoring record: 307 digits (1023 bits). It's a > special number -- 2^1039 - 1 -- but the techniques can be > generalized. Expect regular 1024-bit numbers to be factored