Re: What is the practical strength of DSA1024/Elgamal2048 (former GnuPG default)?

2019-04-25 Thread Kristian Fiskerstrand
On 4/25/19 9:20 AM, Bernhard Reiter wrote: > Wikipedia points out a strong sensitivity of the algorithm to the quality of > random number generators and that implementations could deliberately leak > information in the signature [3]. This alone probably is a reason to switch > keys. This

What is the practical strength of DSA1024/Elgamal2048 (former GnuPG default)?

2019-04-25 Thread Bernhard Reiter
Hello, until about 2009 GnuPG [1] had dsa1024/elg2048 as default key algorithms. There are still keys around with those algorithmus. Recommendations from the US and Europe [2] only list DSA between 1900 and 3000 bits as allowed for legacy use. So it is clear that DSA1024 should not be used