Re: Safety of the key and it's length

2009-01-27 Thread Michał Gołębiowski
Werewolf wrote: Try either putting the line enable-dsa2 in your gpg.conf file or on the commandline add the command gpg --enable-dsa2 --gen-key Thanks for help and info, to You and anybody who explained connected issues. :) -- Pozdrawiam, Michał Gołębiowski

Safety of the key and it's length

2009-01-26 Thread Michał Gołębiowski
I generated a gpg key using 'gpg --gen-key' (using GPG 1.4.6). What concerns me is that no matter how strong agorithm would I choose, it doesn't affect the size of the public private key. It's probably ok, but I wonder - how safe is the private key having exported ASCII signature sized circa 2600

Re: Safety of the key and it's length

2009-01-26 Thread David Shaw
On Jan 26, 2009, at 8:10 AM, Michał Gołębiowski wrote: I generated a gpg key using 'gpg --gen-key' (using GPG 1.4.6). What concerns me is that no matter how strong agorithm would I choose, it doesn't affect the size of the public private key. It's probably ok, but I wonder - how safe is the

Re: Safety of the key and it's length

2009-01-26 Thread Robert J. Hansen
Michał Gołębiowski wrote: I generated a gpg key using 'gpg --gen-key' (using GPG 1.4.6). What concerns me is that no matter how strong agorithm would I choose, it doesn't affect the size of the public private key. A 2048-bit number is just 256 bytes of data. There's a lot of stuff which

Re: Safety of the key and it's length

2009-01-26 Thread Werewolf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Michał Gołębiowski wrote: I generated a gpg key using 'gpg --gen-key' (using GPG 1.4.6). What concerns me is that no matter how strong agorithm would I choose, it doesn't affect the size of the public private key. It's probably ok, but I wonder

Re: Safety of the key and it's length

2009-01-26 Thread James P. Howard, II
On Jan 26, 2009, at 10:01 AM, Robert J. Hansen wrote: Even a small key, 1024 bits, is probably much more secure than you are. If your traffic is encrypted with even a 1k key, the likelihood of someone attacking your traffic cryptanalytically is about zero. They'll decide to try other

Re: Safety of the key and it's length

2009-01-26 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Michał Gołębiowski escribió: I generated a gpg key using 'gpg --gen-key' (using GPG 1.4.6). What Maybe you should consider upgrading to 1.4.9, if possible... If you don't have enabled dsa2 at gpg.conf file, DSA keys can be just 1024 bits

Re: Safety of the key and it's length

2009-01-26 Thread David Shaw
On Mon, Jan 26, 2009 at 10:06:45AM -0500, James P. Howard, II wrote: On Jan 26, 2009, at 10:01 AM, Robert J. Hansen wrote: Even a small key, 1024 bits, is probably much more secure than you are. If your traffic is encrypted with even a 1k key, the likelihood of someone attacking your

Re: Safety of the key and it's length

2009-01-26 Thread Robert J. Hansen
James P. Howard, II wrote: There are some ancient keys out there which are 512 bits (and I think I've seen smaller). Are these likely still secure enough to use? Depends on your threat model. Secure against a casual snoop? Probably. Secure against someone who knows what they're doing and is