On 27-03-2015 14:21, Martin Behrendt wrote: > So especially when introducing new algorithms which might be tampered > with, using e.g. an old style RSA Key as one layer and ECC as a second > should help against this. Or am I missing something here?
Why would you want to use a suspect algorithm if the RSA alone is secure enough? -- ir. J.C.A. Wevers PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users