[SLUG] RSA master keys == evil

From: Dylan Hardison (dylanwh@gmail.com)
Date: Mon Feb 21 2005 - 02:21:25 EST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Right. Well, Don't create a GPG key with the master key being RSA;
pgp.mit.edu and other places don't support it. Which really sucks.
Anyway, I'm going to create a new DSA 1024bit master key now,
and until then I'll sign this with my old key, which hasn't expired (yet).

I really hate pgp.mit.edu for this, but eh. DSA 1024bit is probably
not as strong as RSA 4096. The theory for having a master signing key
of 4096 bits is it gives much more time for it to fall for cryptoanalysis,
and that I could have subkeys that lasted only a few months, that
would have less bits
(and so not take an age to sign something), and would leave it very
hard for cryptoanalysis to break
things... That was the theory, anyway.

Righto. Anyway, once i get my keyship straightened out, how would you
folks like to have
a GPG keysigning party? :)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCGYuII5/IM/Ms9vYRAvzXAKC3pT5t7ALMxQ9mDC7iYs2SmFCaTgCeM96g
Hl73D7uG/gLrr0R6ABsoimM=
=dgCn
-----END PGP SIGNATURE-----
-----------------------------------------------------------------------
This list is provided as an unmoderated internet service by Networked
Knowledge Systems (NKS). Views and opinions expressed in messages
posted are those of the author and do not necessarily reflect the
official policy or position of NKS or any of its employees.



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 19:25:09 EDT