Re: 32768-bit key
My name is Snowden. I don't care. And I cannot send a decrypted version of the mail. Then please learn how to do so. To recap: 1. There is no point in a 32kbit RSA key. 2. For that reason, GnuPG doesn't allow you to generate one. 3. I will not help you do something that has no point. 4. Do not send encrypted messages to the mailing list. 5. Do not sent HTML messages to the mailing list. I hope I am being clear. If you have further questions that are not completely answered above, we look forward to hearing them. OpenPGP_signature Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
OT: Re: 32768-bit key
On 8/27/23 08:42, isp_stream via Gnupg-users wrote: I do not get the point of this thread, please stop. -- John Doe ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Re: 32768-bit key
My name is Snowden. And I cannot send a decrypted version of the mail. > On Sunday, 27. August 2023 2:28, Robert J. Hansen via Gnupg-users > [/webmail/send?to=gnupg-users@gnupg.org] wrote: > > > > I will not answer encrypted messages posted to the list. This is a public > mailing list. Signatures are fine, but encrypted person-to-person messages are > not. > > Also, please do not send HTML email to the list. Many of the people you hope > will read your email refuse to read HTML email. > > ___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > https://lists.gnupg.org/mailman/listinfo/gnupg-users___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 32768-bit key
I will not answer encrypted messages posted to the list. This is a public mailing list. Signatures are fine, but encrypted person-to-person messages are not. Also, please do not send HTML email to the list. Many of the people you hope will read your email refuse to read HTML email. OpenPGP_signature Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Re: ***UNCHECKED*** 32768-bit key
-BEGIN PGP MESSAGE- hF4DqiTMgbiu0IsSAQdAIxIXDZNcIaFZZGs3nr+2bd3yzmDQkBl7eksKX5ETqRIw 3u7QaS5QiuVOr1ZF7rKAx5hetVbe2NfvByBLs8Xw5hVI0VDGZ2/L62jf0QXnrWuk 0sAiAVNO9kiUE9BvGsvc4ksmZQ76Q7QjFysUe+flDJn5fXTM2nwE2D639PPiigRu puCOR/YolulNzHmK0wP7XV80r4+9p7Tz3wqfOja1kODModoclYnfh+IYgC5KXxtA VdzgFLpBh7Wnt6WYdTlIrg/YBOOh/xcAMS+apKwcd32OJgWhdodXlKkMSF5Fo6Tw 23SUsNSovl+rCkNZZXROwjfMfuXiwlyr8zB3jEi5RCNrPHWaArQfFdCNnbxz+QqU F5a3fDJVa7A9FS96ZvQ9cYUNNZNKRPRsS2xcTwpExyMUnX9J6A== =elyn -END PGP MESSAGE- > On Monday, 10. July 2023 1:08, Robert J. Hansen via Gnupg-users > [/webmail/send?to=gnupg-users@gnupg.org] wrote: > > > > > How do I upp the limit of the RSA-key to 32768? > > First, come up with a reason why you need one. > > A 2048-bit key is hypothesized to possess about 112 bits of entropy; a > 3072-bit key, about 128; a 16k-bit, about 256. You very rapidly reach a point > of dramatically diminishing returns. A 32k key gives you essentially nothing > in terms of resistance to cryptanalysis, while making it impossible for the > rest of the OpenPGP ecosystem to work with you because your public certificate > is so unreasonably large. > > > The TailsOS team has a key that's wy over 16384-bit. > > I suggest filing a bug report with them and asking them why they ignore the > best practices of cryptography. > > ___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > https://lists.gnupg.org/mailman/listinfo/gnupg-users-BEGIN PGP PUBLIC KEY BLOCK- mJMEZOilahMFK4EEACMEIwQAS2GD2MfSdbbTF01a9scxGzaDFIIFwbdU8+P6CjTo fPNk6aNyj7Z+vsd5EAzbCtW2y8i8qFTGbBSdEjOqJJWJ/9YA9H11lwkP5DJH7HP1 oeU1ueaRn7i6KGKgeZ/EbESpdAb0o9bGSOhf+7Sz+fQFL/l7rE3SePJ168TxLnFI WN9tL6+0HXh5ejkzOCA8eHl6OTM4QG9uaW9ubWFpbC5vcmc+iNQEExMKADgWIQSX 5bcxxFM/iufQwoBQqUqOViracQUCZOilagIbAwULCQgHAwUVCgkICwUWAgMBAAIe AQIXgAAKCRBQqUqOViracc6+AgkBEV2MwsdaQaeOUHLEEgusIQPXc2nIg6MFlTzs e1UY7ciqqZFmiDUKyznDwgmibiqpWEadVEKVh2cEaw8RVc6/RmwCCQGpYppu2yAN 0Rv2X2rPMfanoLTay3C3aQyciA6y0G2eLnb/BSyonptAmGMc8/vUenzmoJTjXF/y NAS6GzLblyp2+7iXBGTopWoSBSuBBAAjBCMEAeEZXPGk7N2NhZS2ktjZEV2QQjvJ aCWJD1PUrNucBXY+q1eV/1AX+n/nhqqV2uvkOsf6JOxPervYPNx3T/s7RTgOAHAU SeM9OoSKyWSrPkAnjFDFcW6nai9HMXzrBtAcGZnQCa2GuuBtPe6/yWcVT1l/iria X4HVSITYTcj8s5HgFTLIAwEKCYi7BBgTCgAgFiEEl+W3McRTP4rn0MKAUKlKjlYq 2nEFAmTopWoCGwwACgkQUKlKjlYq2nGaQAIGPQGRai1VQMiiYYkJ6Lmyz6dR/+Lg Ivs+tQ8n8qyKoSlRq38B2LetkzJcH5X9prYvzlMdWOeCimtzrNu1va9KnL8CCQHP cQKJIjrLE8O2qQ8Ri+tcCiKBA9iNvV9GcrPzwDxQprT1n2m/okhJ3uoIgy1nafRE M55Mk8CTspY2ExvFmSgKaA== =CXDM -END PGP PUBLIC KEY BLOCK- ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 32768-bit key
Robert J. Hansen via Gnupg-users wrote: >> I don't know that there's anything to file a bug about. I >> don't see any non-rsa4096 keys on the Tails website: > > One of their certificates has a Curve-25519 subkey. I wonder if that's what > the original poster saw, and mistook it for being a 25,519-bit subkey. Ahh, that's a very good guess. I missed that sub key while I was skimming the list of keys. -- Todd signature.asc Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 32768-bit key
I don't know that there's anything to file a bug about. I don't see any non-rsa4096 keys on the Tails website: One of their certificates has a Curve-25519 subkey. I wonder if that's what the original poster saw, and mistook it for being a 25,519-bit subkey. ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 32768-bit key
Robert J. Hansen via Gnupg-users wrote: >> The TailsOS team has a key that's wy over 16384-bit. > > I suggest filing a bug report with them and asking them why they ignore the > best practices of cryptography. I don't know that there's anything to file a bug about. I don't see any non-rsa4096 keys on the Tails website: https://tails.net/doc/about/openpgp_keys/ -- Todd signature.asc Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 32768-bit key
How do I upp the limit of the RSA-key to 32768? First, come up with a reason why you need one. A 2048-bit key is hypothesized to possess about 112 bits of entropy; a 3072-bit key, about 128; a 16k-bit, about 256. You very rapidly reach a point of dramatically diminishing returns. A 32k key gives you essentially nothing in terms of resistance to cryptanalysis, while making it impossible for the rest of the OpenPGP ecosystem to work with you because your public certificate is so unreasonably large. The TailsOS team has a key that's wy over 16384-bit. I suggest filing a bug report with them and asking them why they ignore the best practices of cryptography. OpenPGP_0x1DCBDC01B44427C7.asc Description: OpenPGP public key OpenPGP_signature Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
32768-bit key
Dear sirs and ladies. I've compiled GnuPG as per instructions on your home page. Thank you. The max size of my key is 16384-bits. How do I upp the limit of the RSA-key to 32768? The TailsOS team has a key that's wy over 16384-bit. Thank you. Best regards xyz938___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users