[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Why are 1024 bit keys the limit right now?
There is no PGP 2.6.3; at least not that came from MIT... Someone
else may have made something claiming to be 2.6.3, but it did not
originate from MIT.
-derek
"Mark M." <[email protected]> writes:
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> On Wed, 8 Jan 1997, James A. Tunnicliffe wrote:
>
> > All current versions of PGP allow key sizes up to 2048* bits. (When
> > asked for the size of the key to generate, it allows you to select 512,
> > 768, 1024, OR TO *TYPE IN THE NUMBER OF BITS DESIRED*.) There are older,
> > partially incompatible versions that allow even larger keys, though
> > there is little reason to go higher. Beyond something like 3100 bits, it
> > is surmised that the 128-bit IDEA session key is easier to attack.
>
> RSAREF limits the size of the key being generated to 1024 bits. RSADSI
> permitted PGP to distribute a slightly altered version that supports keys up
> to 2048 bits with the U.S. version. 2.6.3 does not have the altered RSAREF
> code, so the U.S. version cannot use keys larger than 1024 bits (unless, of
> course, one uses the rsaref library distributed with 2.6.2).
>
>
> Mark
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3
> Charset: noconv
>
> iQEVAwUBMtQLkCzIPc7jvyFpAQHGywf9ErGW2MWT/W0fMytbsuRXj0oc+BkYdgZE
> iJwfTBE7Fm6M8P8J/g+iGfIU/UTJyn8A0FpIaAtCT3Thzj2ocVl+uYos85P15gE1
> JPwSMQYji+mS0l2gx7vFQr0IfKfn3jRxq9AukbQaSPTbUB2SaN1jHig+O0o2YD16
> 32/hJMjuEerfLpjrgjHU01g0Km2ft3xdIv1zBEAqJipUUXVdieaSnEOSuDzoxEde
> BW561hJpNpra6oZmga7qkgHVomRehXxbnBiX/NFh59mPA2N+OC+u5zHNgd2vVwVt
> w6yHWc/UFZtTx58QDFecboQO+ybcpc/i/vNr0b2VFLxAluqjZTxHVg==
> =nv7R
> -----END PGP SIGNATURE-----
>
--
Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
Member, MIT Student Information Processing Board (SIPB)
Home page: http://www.mit.edu:8001/people/warlord/home_page.html
[email protected] PP-ASEL N1NWH PGP key available