I use ed25519

Besides all the claims of it being more secure / performant, I like it because it's a shorter key. I did a simple google search and here is gitlabs notes on ssh keys which also recommends ed25519,

https://docs.gitlab.com/user/ssh/#ed25519-ssh-keys

On 1/20/2026 10:15 AM, Ben Koenig via PLUG wrote:
Hey all,

This is probably a pretty basic question that I could look up elsewhere, but in 
the interest of completeness I thought I'd ask here.

Does anyone know (or have a link to) the current "best practices" for creating 
a GPG or SSH key? I know this kind of thing tends to evolve over time so I figured the 
start of 2026 was a good time to ask.

Specifically, I'm interested in RSA vs other encryption algorithms. I've read that 
RSA4096 has been recommended for some time now, but are there benefits and/or caveats to 
selecting the other algorithms? Proton Mail recommends RSA2048 due to performance which 
makes sense for that use case. Their client '"end" for e2e is javascript 
running in a browser so I can see how a bigger key would slow things down..

Thoughts? Suggestions? Rants about the futility of cybersecurity with the 
advent of quantum computers?

-Ben

p.s. as a side giggle.. the web form used to compose emails for Proton is flagging "GPG", 
"RSA", and "javascript" as spelling errors. You'd think that after 30-ish years the 
spellcheck dictionaries would have been updated to use common computer terms. wow.

--
Matt Kowalczyk

Reply via email to