Re: long-term GPG signing key

2006-01-11 Thread Anne & Lynn Wheeler
Perry E. Metzger wrote: > Even in totally ordinary circumstances it is important to have very > strong signing keys. Your comments were insupportable. there is a somewhat separate issue having to do with security proportional to risk. minor old posting: http://www.garlic.com/~lynn/2001h.html#61 t

quantum chip built

2006-01-11 Thread Steven M. Bellovin
http://www.wired.com/news/technology/0%2c70001-0.html?tw=wn_tophead_5 ... So, on a semiconductor chip roughly the size of a postage stamp, the Michigan scientists designed and built a device known as an ion trap, which allowed them to isolate individual charged atoms and manipulate their quant

Re: long-term GPG signing key

2006-01-11 Thread Perry E. Metzger
Ian G <[EMAIL PROTECTED]> writes: > Perry E. Metzger wrote: >> Ian G <[EMAIL PROTECTED]> writes: >> >>>Travis H. wrote: >>> I'd like to make a long-term key for signing communication keys using GPG and I'm wondering what the current recommendation is for such. I remember a problem wit

Re: long-term GPG signing key

2006-01-11 Thread Ian G
Perry E. Metzger wrote: Ian G <[EMAIL PROTECTED]> writes: Travis H. wrote: I'd like to make a long-term key for signing communication keys using GPG and I'm wondering what the current recommendation is for such. I remember a problem with Elgamal signing keys and I'm under the impression that

Re: long-term GPG signing key

2006-01-11 Thread Ian G
Travis H. wrote: On 1/10/06, Ian G <[EMAIL PROTECTED]> wrote: 2. DSA has a problem, it relies on a 160 bit hash, which is for most purposes the SHA-1 hash. Upgrading the crypto to cope with current hash circumstances is not worthwhile; we currently are waiting on NIST to lead review in hashes

Re: long-term GPG signing key

2006-01-11 Thread Adam Back
There are a number of differences in key management priorities between (communication) signature and encryption keys. For encryption keys: - you want short lived keys - you should wipe the keys after at first opportunity - for archiving you should re-encrypt with storage keys - you can't detect o

Re: long-term GPG signing key

2006-01-11 Thread Travis H.
On 1/10/06, Ian G <[EMAIL PROTECTED]> wrote: > 2. DSA has a problem, it relies on a 160 > bit hash, which is for most purposes the > SHA-1 hash. Upgrading the crypto to cope > with current hash circumstances is not > worthwhile; we currently are waiting on > NIST to lead review in hashes so as to

Re: long-term GPG signing key

2006-01-11 Thread Perry E. Metzger
Ian G <[EMAIL PROTECTED]> writes: > Travis H. wrote: >> I'd like to make a long-term key for signing communication keys using >> GPG and I'm wondering what the current recommendation is for such. I >> remember a problem with Elgamal signing keys and I'm under the >> impression that the 1024 bit s

Re: long-term GPG signing key

2006-01-11 Thread Ian G
Amir Herzberg wrote: Ian G wrote: Travis H. wrote: I'd like to make a long-term key for signing communication keys using GPG and I'm wondering what the current recommendation is for such. I remember a problem with Elgamal signing keys and I'm under the impression that the 1024 bit strength p