-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi,

might be nitpick, but..

On 08/13/2015 05:17 AM, Mike Frysinger wrote:

> +Your best option is to generate new keys using newer types such as
> rsa +or ecdsa or ed25519.  RSA keys will give you the greatest
> portability +with other clients/servers while ed25519 will get you
> the best security +with OpenSSH (but requires recent versions of
> client & server).

Strictly speaking DSA/DSS is newer than RSA (FIPS-186-1 came in early
90's, RSA around since 70s, although the ElGamal signature scheme was
around before that). ECC gives a better performance on the same
security level when comparing to DSA/RSA, however claiming better
security in general isn't necessarily valid, Ed25519 is a signature
scheme over Curve25519 which is a 256 bit curve generally considered
to be 128 bit security level, roughly comparable to a 3072 bit RSA key.

(as a side note, it seems OpenSSH was not updated for FIPS-186-3 that
adds other key lengths to DSA, but refers to DSA to mean FIPS-186-2)




- -- 
Kristian Fiskerstrand
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJVzEChAAoJECULev7WN52F9RgH/2ogCdlZv+RoY7fwaTrviyFK
oAzDRubkCPuIFAuERgqpkPlnu692tnNXXtJ6w4krSpg4lFSeh7KPPYM/C9dA++V4
7/oyCuOiQ6pxcQlHa1dTpCQjdWAOE5SL0os4Fy81hVGAvZgPGubRQSelBe9UUE4U
tP7Z+5FW/bnX91K0OZEl75qoKvLT4xqhWNUiLG3V1aUCN+DC7ZaSJkoC27vd+l+b
iqetcOzudojT4DyltO+dIkzQeSlaMF6qZnmq+MJU5m9b8U9ACw30YalD8awumN21
6cK0nOOxQI4M0VRLjl+9xMLrYnuQbeJnN3JBZpKnTcZ5S3hs0DPfhvTcAv0pyaw=
=LHJd
-----END PGP SIGNATURE-----

Reply via email to