[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: WARNING!
Nobody writes:
>My only concern would be whether the implementation of longer keys might
>possibly "push the envelope" of the math routines used, and thus introduce
>subtle, hidden weaknesses. Two examples might be an RNG that became
>non-random with larger numbers, or a primality tester that failed to detect
>larger non-primes. If you have evidence for any of those scenarios, I'd
>love to hear it. Personally, I'm staying with PGP 2.3a until the dust
>settles a bit. I've FTPed the RSAREF 2.6 release, and it remains in its
>zipped archive for now.
I'd like to see PGP eventually remove artifical constraints on key sizes.
The MP package in PGP uses fixed-size buffers, but a more general approach
using variable-sized buffers is used in other packages such as gmp. These
do not force you to use compiled-in limits on sizes like this. The basic
multi-precision integer data structure in PGP does have a limit of 64K bits
but that is probably not worth changing.
Remember that it is the owner of a long key who pays most of the price of
using it. He is the one who has to wait through lengthy signs and decrypts.
The signature-checking and encryption which other people do just involve
a few multiplications and should be pretty fast even for sizable keys. So
I don't see any reason PGP should take this decision out of people's hands.
>Just as an aside, can some of the PGP-aware-anon-remailer operators comment
>on what they plan to do with respect to the various PGP versions?
I'm still running 2.3. I figure that when the time comes I'll hack it to
accept 2.6 messages.
Hal