Re: Updating of Keys

2020-05-11 Thread Michał Górny via Gnupg-users
W dniu pon, 11.05.2020 o godzinie 17∶22 -0700, użytkownik Mark napisał: > Kinda of a stupid question here about updating your keys. I'm curious > as > to what changes would require you to re-upload it to a keyserver. > > I assume updating the passphrase would not because that is tied to > the

Re: Fwd: The GnuPR FAQ

2020-05-11 Thread raf via Gnupg-users
vedaal via Gnupg-users wrote: > On 5/11/2020 at 6:15 PM, "Robert J. Hansen" wrote: > > > >This arrived in my inbox: I'm presenting it here without comment. > >My > >response will be following in a moment. > > > > > > Forwarded Message > >Subject: The GnuPR FAQ > >Date:

Re: Comparison of RSA vs elliptical keys

2020-05-11 Thread Pete Stephenson via Gnupg-users
On Mon, May 11, 2020, at 5:15 PM, Mark wrote: > I'm trying to understand the differences in strength between an RSA key > and an elliptical one such ed25519 with cv25519. I know with RSA it is > pretty easy to "gauge" the strength 1024 vs 2048 vs 4096.  > > I could not really find anything to say

Updating of Keys

2020-05-11 Thread Mark
Kinda of a stupid question here about updating your keys. I'm curious as to what changes would require you to re-upload it to a keyserver.    I assume updating the passphrase would not because that is tied to the private key but does it change anything in the public key where that might be

Comparison of RSA vs elliptical keys

2020-05-11 Thread Mark
I'm trying to understand the differences in strength between an RSA key and an elliptical one such ed25519 with cv25519. I know with RSA it is pretty easy to "gauge" the strength 1024 vs 2048 vs 4096.  I could not really find anything to say how strong these elliptical keys are and how they

Re: Fwd: The GnuPR FAQ

2020-05-11 Thread vedaal via Gnupg-users
On 5/11/2020 at 6:15 PM, "Robert J. Hansen" wrote: > >This arrived in my inbox: I'm presenting it here without comment. >My >response will be following in a moment. > > > Forwarded Message >Subject: The GnuPR FAQ >Date: Mon, 11 May 2020 14:19:07 -0600 >From: James Long

Re: The GnuPR FAQ

2020-05-11 Thread Robert J. Hansen
> This was back in the Pentium II days!! Processors these days could > likely crack a dictionary based password in a matter of seconds. Tell you what: try it. :) If you choose only from the thousand most-common English words (a keyspace of about 2^10), a six-word passphrase gives a work factor

Fwd: The GnuPR FAQ

2020-05-11 Thread Robert J. Hansen
This arrived in my inbox: I'm presenting it here without comment. My response will be following in a moment. Forwarded Message Subject:The GnuPR FAQ Date: Mon, 11 May 2020 14:19:07 -0600 From: James Long To: r...@sixdemonbag.org Greetings! I'm just getting