1996-01-04 - Re: 2047 bit keys in PGP

Header Data

From: frantz@netcom.com (Bill Frantz)
To: Rick Busdiecker <mianigand@unique.outlook.net>
Message Hash: 2c9b6478c7c2ecd8240655c7484540903819c63efe7eb3201983d038a90592cf
Message ID: <199601040341.TAA19633@netcom5.netcom.com>
Reply To: N/A
UTC Datetime: 1996-01-04 03:45:24 UTC
Raw Date: Wed, 3 Jan 96 19:45:24 PST

Raw message

From: frantz@netcom.com (Bill Frantz)
Date: Wed, 3 Jan 96 19:45:24 PST
To: Rick Busdiecker <mianigand@unique.outlook.net>
Subject: Re: 2047 bit keys in PGP
Message-ID: <199601040341.TAA19633@netcom5.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 19:52 1/3/96 -0500, Rick Busdiecker wrote:

>Another point to realize is that PGP uses a combination of ciphers.
>When encrypting, the RSA key is only used to encrypt an IDEA key.
>That IDEA key is used to encrypt your message.  Somewhere between 2048
>and 4096, you're making the RSA key stronger (harder to brute force)
>than the IDEA key.  At that point, the extra time that you're using
>for super-big RSA keys is totally wasted.

To nitpick:  Getting the RSA key will give you ALL the IDEA keys.  That is
probably worth 200-10000 times the effort.


-----------------------------------------------------------------
Bill Frantz                   Periwinkle  --  Computer Consulting
(408)356-8506                 16345 Englewood Ave.
frantz@netcom.com             Los Gatos, CA 95032, USA







Thread