[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Why are 1024 bit keys the limit right now?



There is no PGP 2.6.3; at least not that came from MIT... Someone
else may have made something claiming to be 2.6.3, but it did not
originate from MIT.

-derek

"Mark M." <[email protected]> writes:

> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> On Wed, 8 Jan 1997, James A. Tunnicliffe wrote:
> 
> > All current versions of PGP allow key sizes up to 2048* bits.  (When
> > asked for the size of the key to generate, it allows you to select 512,
> > 768, 1024, OR TO *TYPE IN THE NUMBER OF BITS DESIRED*.) There are older,
> > partially incompatible versions that allow even larger keys, though
> > there is little reason to go higher. Beyond something like 3100 bits, it
> > is surmised that the 128-bit IDEA session key is easier to attack.
> 
> RSAREF limits the size of the key being generated to 1024 bits.  RSADSI
> permitted PGP to distribute a slightly altered version that supports keys up
> to 2048 bits with the U.S. version.  2.6.3 does not have the altered RSAREF
> code, so the U.S. version cannot use keys larger than 1024 bits (unless, of
> course, one uses the rsaref library distributed with 2.6.2).
> 
> 
> Mark
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3
> Charset: noconv
> 
> iQEVAwUBMtQLkCzIPc7jvyFpAQHGywf9ErGW2MWT/W0fMytbsuRXj0oc+BkYdgZE
> iJwfTBE7Fm6M8P8J/g+iGfIU/UTJyn8A0FpIaAtCT3Thzj2ocVl+uYos85P15gE1
> JPwSMQYji+mS0l2gx7vFQr0IfKfn3jRxq9AukbQaSPTbUB2SaN1jHig+O0o2YD16
> 32/hJMjuEerfLpjrgjHU01g0Km2ft3xdIv1zBEAqJipUUXVdieaSnEOSuDzoxEde
> BW561hJpNpra6oZmga7qkgHVomRehXxbnBiX/NFh59mPA2N+OC+u5zHNgd2vVwVt
> w6yHWc/UFZtTx58QDFecboQO+ybcpc/i/vNr0b2VFLxAluqjZTxHVg==
> =nv7R
> -----END PGP SIGNATURE-----
> 

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board (SIPB)
    Home page: http://www.mit.edu:8001/people/warlord/home_page.html
       [email protected]    PP-ASEL     N1NWH    PGP key available