-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 El 22-05-2012 8:34, da...@gbenet.com escribió: ... > Some say that all the power of the universe - and all the time its > been in existence will not crack a 2048 bit key with a secure > passphrase. So by the time the universe is well and
That is about if you secret key falls in the hands of somebody wanting to use it. But factoring your public key to obtain a working copy of your secret key is certainly something that may be done before the end of time, and won't require dyson spheres to power the machine. We know one day RSA 2048 will be broken... BUT, the question is: "will it matter to us when it happens?". Maybe I will say "Finally! I will be able to revoke that orphan key I uploaded to keyservers when I was learning how to use GPG... if I could remember the UID it had". We can use RSA 2048 and wait until something stronger is available, or we can go RSA 3072 and be even safer. Or we can even go RSA 4096, and people will say "that's an overkill!!!", all that without modifying GnuPG. Best Regards -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBCAAGBQJPvEA5AAoJEMV4f6PvczxAMwoH+wWn0YnqWTjBYe3NIvYaGQyW oIvUsAQu5B9xVRP1wN7f0OJFKoPevcaI0pU5erAs6RGpiHmd35oLYzxGEpsCWE26 YJ37m3mBJCGRk0aOkthT6ugDJ4fEHsm5toj2si9ItJNLq2374+8GMoz++c6Vpbf/ b/y/LaWO3eeZXhtdBCC8OSYKdZiUQ1DYBBFT6WAickgYQJ+hYtRhiq2JQq9SicCA KkWEj/NVB7esOMVoVcrQzAxbivgqKwUyGjpOVTmPlnz2lx19t3j5TAucM9Vhrsab wfY3u4dW6T6X24Pv6WEZmyb14JgEAsK8elehU4dyRTKA+OzOAZr1ihcNOODC/Yg= =I24B -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users