1994-12-05 - Re: 2048-bit keys??

Header Data

From: Derek Atkins <warlord@MIT.EDU>
To: cypherpunks@toad.com
Message Hash: 8000a4cf39e51615b6cdae0692e1b3fbe782ab762496df41845f7cdce0b2f87f
Message ID: <9412050004.AA21905@pickled-herring.MIT.EDU>
Reply To: <199412042331.PAA14197@jobe.shell.portal.com>
UTC Datetime: 1994-12-05 00:04:09 UTC
Raw Date: Sun, 4 Dec 94 16:04:09 PST

Raw message

From: Derek Atkins <warlord@MIT.EDU>
Date: Sun, 4 Dec 94 16:04:09 PST
To: cypherpunks@toad.com
Subject: Re: 2048-bit keys??
In-Reply-To: <199412042331.PAA14197@jobe.shell.portal.com>
Message-ID: <9412050004.AA21905@pickled-herring.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain


> just curious, how many random bytes does it take to generate these
> fuckers and can the keyservers out their handle em yet?

Well, it needs about 2048 bits of randomness, I would guess.  It
depends on how many bits/keystroke you can get on your machine...

As for the keyservers, well, I know that mine (pgp.mit.edu) can.

I should let you know that there is a small buglet in PGP 2.6.2 that
will not allow you to generate 2048-bit keys.  It limits you to 2047
bits (there is a piece of code that leaves that one extra bit up there
-- oops).

This shouldn't affect anything, except people will only get 2047 bits
instead of 2048, but I personally do not consider this a problem.

-derek






Thread