Re: Generating 4096 bit key fails – why?

2015-10-27 Thread Daniel Baur
Hello,
Am 27.10.2015 um 11:11 schrieb Felix E. Klee:
> As already mentioned in the October 2015 thread “Bad secret key” on
> , I cannot generate a 4096 bit on
> my [OpenPGP card][1]. What could be the issue?

AFAIK the card doesn’t support 4096 bit keys. The webpage given by you
says the same AFAIS:

“Key lengths reducable to 1024 bit; key length of signature keys
increasable to 3072 bit. ”

Sincerely,
DaB.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Generating 4096 bit key fails – why?

2015-10-27 Thread Werner Koch
On Tue, 27 Oct 2015 11:11, felix.k...@inka.de said:

> gpg: error changing size of key 1 to 4096 bits: Invalid data

Please add

--8<---cut here---start->8---
  debug 1024
  debug 2048
  log-file /this/is/my/scdaemon.log
--8<---cut here---end--->8---

to scdaemon.conf, kill scdaemon, and try again.  The log file will then
contain a log of all APDUs send and received to/from the card.  Post it
here.  Make sure to change the PINs of the card before you start the
logging so that you want reveal your PINs.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Generating 4096 bit key fails – why?

2015-10-27 Thread Felix E. Klee
As already mentioned in the October 2015 thread “Bad secret key” on
, I cannot generate a 4096 bit on
my [OpenPGP card][1]. What could be the issue?

Details:

$ uname -a
Linux felix-arch 4.2.3-1-ARCH #1 SMP PREEMPT Sat Oct 3 18:52:50 CEST
2015 x86_64 GNU/Linux
$ gpg --version
gpg (GnuPG) 2.1.9
libgcrypt 1.6.4
[…]
$ gpg --card-edit

Application ID ...: D276000124010201000540D8
Version ..: 2.1
Manufacturer .: ZeitControl
Serial number : 40D8
Name of cardholder: Felix Klee
Language prefs ...: de
Sex ..: unspecified
URL of public key : [not set]
Login data ...: [not set]
Signature PIN : not forced
Key attributes ...: rsa2048 rsa2048 rsa2048
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 0
Signature key : [none]
Encryption key: [none]
Authentication key: [none]
General key info..: [none]

gpg/card> admin
Admin commands are allowed

gpg/card> generate
Make off-card backup of encryption key? (Y/n) n
What keysize do you want for the Signature key? (2048) 4096
The card will now be re-configured to generate a key of 4096 bits
Note: There is no guarantee that the card supports the requested
  size. If the key generation does not succeed, please check the
  documentation of your card to see what sizes are allowed.
gpg: error changing size of key 1 to 4096 bits: Invalid data

[1]: http://g10code.com/p-card.de.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: absolutely nothing to panic over

2015-10-27 Thread Daniele Nicolodi
On 27/10/15 08:25, listo factor wrote:
> On 10/27/2015 03:55 AM, Robert J. Hansen wrote:
>> You start from tautology and conclude at paradox.  This doesn't appear
>> to be something to be taken seriously.
> 
> Allow me to try again:
> 
> *There is no secure communication over an insecure channel
> without out-of-channel bootstrap*.
> 
> I believe the above can be re-phrased as follows, with no change
> in meaning:
> 
> Cryptography is an art of turning large secrets into small secrets. [1]
> 
> We need a secure channel to transfer small secrets (typically
> the cryptographic device and the key), so that we can communicate
> large secrets over an insecure channel. [2]

If what makes you think that public key cryptography is insecure by
definition is the possibility to circumvent any key exchange protocol
via quantum computation, please note that the same quantum principles
allow for quantum key distribution, which is "quantum secure" key
exchange over an insecure channel.

In general I find broad and overly simplified statements on complex
matter very easy to confute, and I thus believe that they must not be
taken too seriously.

Cheers,
Daniele


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: absolutely nothing to panic over

2015-10-27 Thread listo factor

On 10/27/2015 03:55 AM, Robert J. Hansen wrote:

You start from tautology and conclude at paradox.  This doesn't appear
to be something to be taken seriously.


Allow me to try again:

*There is no secure communication over an insecure channel
without out-of-channel bootstrap*.

I believe the above can be re-phrased as follows, with no change
in meaning:

Cryptography is an art of turning large secrets into small secrets. [1]

We need a secure channel to transfer small secrets (typically
the cryptographic device and the key), so that we can communicate
large secrets over an insecure channel. [2]

___

[1] The definition is of course not mine.

[2] It is often forgotten that it is not ~only~ the key
that comprises the "bootstrap". The cryptographic device does not
need to be secret, but it must be authenticated, which can not be
done over an insecure channel. Same holds for the "public" key in
asymmetric systems.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users