Sunday, December 26. 2010Goodbye 3DBD3B20, welcome BBB51E42Trackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
What's so special in letter ö aside the fact that it does not occur in Zulu alphabet?
It's not part of the ASCII charset and it's thus represented differently in UTF-8, Codepage 850 and ISO-8859-1. This means lot's of technical problems (e. g. it seems i won't be able to get my key signed by CAcert at the moment due to a bug in CAcert's software).
I've, my self, after some years came to the conclusion that currently the best configuration (before creating the key... or change it to):
inside gpg.conf file: comment "" enable-dsa2 default-preference-list AES192 AES256 AES SHA384 SHA512 SHA256 ZLIB BZIP2 ZIP personal-cipher-preferences AES192 cipher-algo AES192 personal-digest-preferences SHA384 cert-digest-algo SHA384 digest-algo SHA384 personal-compress-preferences ZLIB compress-algo ZLIB The maximum key I can create and that is guaranteed to work is a RSA 4096 bit key... and that "only" gives 128 bits of security according to FNISA, or between 128 and 150(?) bits of security according to ECRYPT II and NIST. So I don't need to use AES256 by default because the RSA key doesn't provide more protection than 128/150(?) bits... and choose AES192 (just to have some security margin), and SHA-256 is supposed to offer 128 bits of security... so I choose SHA-384 (just to have some security margin).. it should provide 192 bits of security. So It's just a compromise between some security margin, speed and having in mind the weakest point (RSA key). AES256 and SHA-512 was second choice, in case some one doesn't have AES192 or SHA384... I don't want to default to AES or worse 3DES... then it comes AES and SHA256... the latest option (because with GnuPG 2.0.19 I can't built it my self in windows) comes the insecure 3DES and SHA1... I preferred not to have this last two... but someone, somewhere wants to force insecure options (some 3 letter agency?) and the GnuPG inserts (against my will) 3DES and SHA1 either I want it or not. Camellia cypher unfortunately doesn't work with PGP... and if I use it, PGP users will complaint many times about not being able to open the messages (seems like a bug to me... not supporting is one thing, another is give error). When creating the key it self I find it better to create first 1 main key to (C)ertify and (A)uthenticate, and after, create a new sub-key to (S)ign, and another new sub-key to (E)ncrypt. All with 4096 bits RSA key of course. Curiously (or not) I've not see anyone else doing this, this way... but seems the better compromise between best security (achievable), speed and usability. Security levels comparisons between technologies made at keylength.com (with the sources). |
About meYou can find my web page with links to my work as a journalist at https://hboeck.de/.
You may also find my newsletter about climate change and decarbonization technologies interesting. Hanno Böck mail: hanno@hboeck.de Hanno on Mastodon Impressum Show tagged entries |