Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: GPG key methods and sizes



 On Sun, Dec 16, 2007 at 09:26:57AM -0500, Jerry Feldman wrote: 
> I was about to generate a new key for myself using RSA with a 2048 bit 
> key, but I noticed that the default for GNUPG is DSA and Elgamal. 
> I was wondering since the El Gamal encryption has fairly recently been 
> added to GNU PG, would I still be better to use RSA/2048. 
> 
> Since my use is mostly digital signatures, and very little to convey 
> secure information, I would think that 2048 would be fine.  Just 
> looking for some opinions. I will be allowing my old key to expire. 

The only reason not to choose a longer key length is the extra 
time it takes to encrypt/decrypt. Why don't you test out DSA, 
RSA-2048, and  RSA-4096 on the hardware you use most often and 
see how much of a delay you can stand? 

-dsr- 


-- 
Every time you give up a right, the terrorists win. 
Tyranny is something that creeps up on you. 

http://tao.merseine.nu:81/~dsr/eula.html is hereby incorporated by reference. 

-- 
This message has been scanned for viruses and 
dangerous content by MailScanner, and is 
believed to be clean. 

_______________________________________________ 
Discuss mailing list 
[hidden email] 
http://lists.blu.org/mailman/listinfo/discuss
 


BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org