gpgsm signatures fail starting with 2.1.0-beta864

2014-10-29 Thread Jens Lechtenboerger
Hi there, I cannot sign messages with gpgsm any more. beta834 was (and is) still working, with beta864 and beta895 invalid signatures are created: --8<---cut here---start->8--- echo "Hi" > test.txt gnupg-2.1.0-beta864/sm/gpgsm -o test.txt.sig --sign test.txt gp

Re: gpgsm signatures fail starting with 2.1.0-beta864

2014-10-29 Thread Werner Koch
On Wed, 29 Oct 2014 09:00, lech...@wi.uni-muenster.de said: > Note that I’ve got multiple keys, the first one is expired, one is > revoked, and one is valid. Thus, I need to use --local-user to > create signatures (otherwise, the expired key is tried). I can't replicate that while also using --l

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> Because this gets asked quite often, I've started to capture > some arguments of the debate how long RSAs could/should/can be > at http://wiki.gnupg.org/LargeKeys I thought we largely addressed this in the FAQ, sections 11.1, 11.2, 11.3, 11.4 and 11.5. Do we need to address it in more depth?

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at <

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> Why is brute force even mentioned in something about RSA? You > couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite > covers it 8-) Sure you can. To brute-force a 128-bit RSA key would require you to check every prime number between two and 10**19. There are in the neighborhood of

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread vedaal
On 10/29/2014 at 3:22 PM, "Robert J. Hansen" wrote: > >> Why is brute force even mentioned in something about RSA? You >> couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite >> covers it 8-) - Surely Peter knows this too ;-) More likely 128 was a typo for the more common older

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 21:49, ved...@nym.hush.com wrote: Surely Peter knows this too ;-) More likely 128 was a typo for the more common older RSA key of 1028 ... No, I'm using a strict definition of brute force. For p = 2^63 to 2^64-1 For q = 2^63 to 2^64-1 If p * q == n: Break Next Nex

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> More likely 128 was a typo for the more common older RSA key of 1028 > ... Either-or. RSA-1024's dangerously close to being brute-forceable, too. We've already brute-forced RSA-768 and we're closing in on RSA-890. I haven't looked into how well the general number field sieve parallelizes, but

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Robert J. Hansen
> No, I'm using a strict definition of brute force. Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? If you're trying to factorize 2701, for instance, you can feel free to skip dividing by 2 (doesn't end in an even numbe

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 22:30, Robert J. Hansen wrote: Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? Well, why not restrict ourselves to primes whose product equal the modulus? I could solve any key in constant time that wa

changing the user PIN for a smartcard in a script

2014-10-29 Thread Florin Andrei
I'm programming the smartcards on a bunch of YubiKey NEO tokens. Before I give the token to the user, I would like to allow them to pick a new user PIN and set it. I don't need to know their PIN and I actually don't *want* to know it. Ideally, I would run a script, have the user type in the ne

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Ingo Klöcker
On Wednesday 29 October 2014 22:18:13 Peter Lebbing wrote: > On 2014-10-29 21:49, ved...@nym.hush.com wrote: > > Surely Peter knows this too ;-) > > > > More likely 128 was a typo for the more common older RSA key of 1028 > > ... > > No, I'm using a strict definition of brute force. > > For p =