Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Sun, Dec 16, 2007 at 09:26:57AM -0500, Jerry Feldman wrote: > I was about to generate a new key for myself using RSA with a 2048 bit > key, but I noticed that the default for GNUPG is DSA and Elgamal. > I was wondering since the El Gamal encryption has fairly recently been > added to GNU PG, would I still be better to use RSA/2048. > > Since my use is mostly digital signatures, and very little to convey > secure information, I would think that 2048 would be fine. Just > looking for some opinions. I will be allowing my old key to expire. The only reason not to choose a longer key length is the extra time it takes to encrypt/decrypt. Why don't you test out DSA, RSA-2048, and RSA-4096 on the hardware you use most often and see how much of a delay you can stand? -dsr- -- Every time you give up a right, the terrorists win. Tyranny is something that creeps up on you. http://tao.merseine.nu:81/~dsr/eula.html is hereby incorporated by reference. -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. _______________________________________________ Discuss mailing list [hidden email] http://lists.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |