From: jim bell <jimbell@pacifier.com>
To: “Michael C. Peponis” <mianigand@unique.outlook.net>
Message Hash: fea107935a165a07c5aa35646fdba84c839cfcab72239cf31cab17d33875a573
Message ID: <m0tXhdo-00092mC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-01-04 05:23:33 UTC
Raw Date: Thu, 4 Jan 1996 13:23:33 +0800
From: jim bell <jimbell@pacifier.com>
Date: Thu, 4 Jan 1996 13:23:33 +0800
To: "Michael C. Peponis" <mianigand@unique.outlook.net>
Subject: Re: 2047 bit keys in PGP
Message-ID: <m0tXhdo-00092mC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
At 05:17 AM 1/4/96 +0000, you wrote:
>
>> Why is there a limit to the size of the key anyway? It's too bad PGP
>> doesn't support any size key (within reason).
>
>Within reason is the Key Phrase. Even with a Pentium 90, I notice a
>considerable lag in decrypting messages that have been encrypted with
>a key larger than 2047/8.
>
>Even if you have a fast machine, if the person recieving the message
>could wait a long time to decrypt you 4096 byte encrypted message.
It seems to me that the best argument AGAINST supporting (and using) keys
greater than 2048 bits is the false sense of security created. Even
1024-bit keys will probably be safe for decades if just the algorithm is
concerned. Far more threatening are various other attacks, including RF
snooping in combination with specialized viruses, as well as black-bag jobs
on hardware.
Why build a castle with a front wall a mile high when the back wall is a
5-foot chain-link fence?!?
Return to January 1996
Return to “jim bell <jimbell@pacifier.com>”