Re: RSA 1024 ridiculous

2007-06-17 Thread Crest
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Am 16.06.2007 um 17:05 schrieb Brian Smith: > IF you have a life-long digital secret that you want to protect from > people with hundreds of millions of dollars to spend, and you > insist on > using RSA public key encryption to protect it during t

Re: RSA 1024 ridiculous

2007-06-17 Thread Remco Post
Crest wrote: > > Isn't it more usefull to switch to ECC instead of using that large keys? Does gnupg support elliptic curve crypto? ;-) -- Met vriendelijke groeten, Remco Post SARA - Reken- en Netwerkdiensten http://www.sara.nl High Performance Computing Tel. +31 20 592

Re: RSA 1024 ridiculous

2007-06-17 Thread Benjamin Donnachie
Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) Not yet... Ben ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) I found this link on the Wikipedia page: http://www.calcurco.cat/eccGnuPG/index.en.html - -- Windows NT 5.1.2600.2180 | Thunderbird 2.0.0.4 | Enigmail 0.95.1 | GPG 1.4.7 Key ID: 0

Re: RSA 1024 ridiculous

2007-06-17 Thread Atom Smasher
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, 17 Jun 2007, Remco Post wrote: > Does gnupg support elliptic curve crypto? ;-) == if you're paranoid about RSA, then there's no reason to go to ECC since the math behind it is still young and uncertain. while a 1024 bit

Re: RSA 1024 ridiculous

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 11:14:35AM +0200, Crest wrote: > Am 16.06.2007 um 17:05 schrieb Brian Smith: > > > IF you have a life-long digital secret that you want to protect from > > people with hundreds of millions of dollars to spend, and you > > insist on > > using RSA public key encryption to p

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Atom Smasher wrote: > gpg does support RSA-2048/SHA-256 (or even RSA-4096/SHA-512) which > is what i've been using for a while now. i'll sign this email with > RSA-2048/SHA-256 (my default on this key) just to show what it > looks like. it's a

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Robert Hübener wrote: > Andrew Berg wrote: >> Try signing/encrypting files that are tens, hundreds, or >> thousands of megabytes in size. Sure, your average machine can >> sign/encrypt messages that don't even fill a cluster without >> breaking a

Re: New version of mac-gpg2

2007-06-17 Thread Benjamin Donnachie
Benjamin Donnachie wrote: > As previous mac-gpg2 releases, this release is intended for power users > only. Universal binary, MacOSX Tiger 10.4.9 and above. Ben ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/

Re: RSA 1024 ridiculous

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 01:20:17PM -0500, Andrew Berg wrote: > Robert Hübener wrote: > > Andrew Berg wrote: > >> Try signing/encrypting files that are tens, hundreds, or > >> thousands of megabytes in size. Sure, your average machine can > >> sign/encrypt messages that don't even fill a cluster wit

New version of mac-gpg2 (was Re: Failing to compile in MacOS X [Announce] Libgcrypt 1.3.0 (development) released)

2007-06-17 Thread Benjamin Donnachie
Charly Avital wrote: > I guess I'll have to wait for 1.4. I've just prepared a new version of gpg v2.0.4 for the Mac which uses libgcrypt v.1.3.0 It can be found at http://www.py-soft.co.uk/~benjamin/download/mac-gpg/mac-gnupg-2.0.4-2.zip with detached signature at http://www.py-soft.co.uk/~benja

Re: RSA 1024 ridiculous

2007-06-17 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Sven Radde wrote: > The actual "bulk" data processing is done by a symmetric algorithm > / hash function. You only encrypt the key to the symmetric > algorithm / sign the hash value. Both are typically 256bit or > smaller. > > In fact, the larger

Re: RSA 1024 ridiculous

2007-06-17 Thread Roscoe
RSA keysize will influence how long it takes you to encrypt or sign a message. But how long the RSA signing/encryption step takes is going to be the same no matter what the message length. That's because you are only ever signing a hash of the message or encrypting the symmetric session key used to

Re: RSA 1024 ridiculous

2007-06-17 Thread Remco Post
Andrew Berg wrote: > Robert Hübener wrote: >> The work for the RSA-part of the algorithm is always the same: It >> only has to process either the hash of the message/file or the key >> for the symmetric cipher. > I don't completely understand. Does this mean that > encryption/signature time is onl

Which key is used when more than one are valid?

2007-06-17 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 My gnupg file that I get with edit-keys myuid contains, among other things: sub 2048g/48FF0850 created: 2007-02-24 expires: 2008-02-24 sub 4096g/124E0663 created: 2007-06-17 expires: 2009-06-16 How do I know which key is used when sending e-mail?

Re: RSA 1024 ridiculous /8192 is sublime

2007-06-17 Thread Newton Hammet
gnupg as distributed may not be generating larger than 4096 bit keys but it is easy enough to (or was in the past) to modify the source code in I think one place and change it to whatever you want. In my case I was able to successfully generate a 8192-bit RSA key and tested it with encryption, dec

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread Newton Hammet
On Sun, 2007-06-17 at 12:58 -0400, David Shaw wrote: > >> >>> Lot's of other stuff, not top-posted here. > GnuPG supports RSA keys much larger than 4096 bits. It does not, > however, currently allow generation of such keys, so the keys must > come from elsewhere. > > > Isn't it more usefull to s

Re: RSA 1024 ridiculous

2007-06-17 Thread Werner Koch
On Sun, 17 Jun 2007 20:02, [EMAIL PROTECTED] said: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt > messages that don't even fill a cluster without breaking a sweat, but > if the sensitive data is large, RSA-

Re: RSA 1024 ridiculous /8192 is sublime

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 12:41:16PM -0500, Newton Hammet wrote: > gnupg as distributed may not be generating larger than 4096 bit keys > but it is easy enough to (or was in the past) to modify the source code > in I think one place and change it to whatever you want. > > In my case I was able to su

Re: Which key is used when more than one are valid?

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 02:49:21PM -0400, Jean-David Beyer wrote: > My gnupg file that I get with edit-keys myuid > contains, among other things: > > sub 2048g/48FF0850 created: 2007-02-24 expires: 2008-02-24 > sub 4096g/124E0663 created: 2007-06-17 expires: 2009-06-16 > > How do I know which

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 02:24:22PM -0500, Newton Hammet wrote: > I did this before in gnupg-1.2.1 (Check the mailing list archives) > but it was a different change... I think, to a header file. (I don't > have or can no longer find the detritus from that excursion) I was > much more energetic then

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 David Shaw wrote: > This year is slightly different in that I'm waiting for someone to > discover they can also raise the key size limit for DSA. That, at > least, is marginally less strange as I put in code to make the hash > size automatically ri

Re: Which key is used when more than one are valid?

2007-06-17 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 David Shaw wrote: > On Sun, Jun 17, 2007 at 02:49:21PM -0400, Jean-David Beyer wrote: >> My gnupg file that I get with edit-keys myuid >> contains, among other things: >> >> sub 2048g/48FF0850 created: 2007-02-24 expires: 2008-02-24 >> sub 4096g/1

Re: Which key is used when more than one are valid?

2007-06-17 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John W. Moore III wrote: > David Shaw wrote: >>> On Sun, Jun 17, 2007 at 02:49:21PM -0400, Jean-David Beyer wrote: My gnupg file that I get with edit-keys myuid contains, among other things: sub 2048g/48FF0850 created: 2007-02-24

new (2007-06-10) keyanalyze results (+sigcheck)

2007-06-17 Thread Jason Harris
New keyanalyze results are available at: http://keyserver.kjsl.com/~jharris/ka/2007-06-10/ Signatures are now being checked using keyanalyze+sigcheck: http://dtype.org/~aaronl/ Earlier reports are also available, for comparison: http://keyserver.kjsl.com/~jharris/ka/ Even earlier month

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread David Shaw
On Sun, Jun 17, 2007 at 06:31:15PM -0400, John W. Moore III wrote: > David Shaw wrote: > > > This year is slightly different in that I'm waiting for someone to > > discover they can also raise the key size limit for DSA. That, at > > least, is marginally less strange as I put in code to make the

Re: Which key is used when more than one are valid?

2007-06-17 Thread John Clizbe
Jean-David Beyer wrote: > John W. Moore III wrote: >> David Shaw wrote: On Sun, Jun 17, 2007 at 02:49:21PM -0400, Jean-David Beyer wrote: > My gnupg file that I get with edit-keys myuid > contains, among other things: > > sub 2048g/48FF0850 created: 2007-02-24 expires: 2008-0

Re: RSA 1024 ridiculous

2007-06-17 Thread Atom Smasher
On Sun, 17 Jun 2007, Andrew Berg wrote: > Try signing/encrypting files that are tens, hundreds, or thousands of > megabytes in size. Sure, your average machine can sign/encrypt messages > that don't even fill a cluster without breaking a sweat, but if the > sensitive data is large, RSA-4096 isn

Re: RSA 1024 ridiculous / RSA 8192 sublime, and, possible with gnupg.

2007-06-17 Thread Atom Smasher
On Sun, 17 Jun 2007, David Shaw wrote: > The defaults in GnuPG are chosen to be basically sane for the > overwhelming majority of users. People who are recompiling GnuPG need > to understand the implications of the change they are making and be > aware they're throwing away that safety net. ==