[OTR-users] What key size am I using?

Matt D md123 at nycap.rr.com
Tue Dec 17 10:01:22 EST 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NIST recommends a minimum 2048-bit keys and some say for pgp mail to
use 4096-bit keys.  I am curious as to why we do not use AES-256 and
larger DSA keys, given the likelihood that programs like echelon are
eating up all of our data.  Should we not at least make them have to
expend a few extra kilo-watts?

On 12/17/2013 09:43 AM, Hans-Christoph Steiner wrote:
> 
> The 1024-bit DSA keys are used in the Diffie-Hellman key agreement
> to come up with keys/passwords for AES-128 encryption that actually
> encrypts the messages.
> 
> My question is: are 1024-bit keys required?  Could I generate and
> use larger DSA keys? If not, anyone know the limiting factors?
> 
> .hc
> 
> On 12/17/2013 09:26 AM, Matt D wrote:
>> I'm sorry, please pardon my ignorance:  So the encryption
>> algorithm is AES-128.  I was under the impression the the key for
>> this is a 128 bit key?  And then there is a different key for
>> users to 'shake hands' ?
>> 
>> Perhaps you could point me to somewhere explaining the
>> nitty-gritty?
>> 
>> On 12/16/2013 09:01 PM, Ian Goldberg wrote:
>>> Encryption is 128-bit AES, derived from a 1536-bit
>>> Diffie-Hellman key agreement.  Long-term authentication keys
>>> are 1024-bit DSA.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsGdCAAoJECrdp7MWSIVbOuEH/194QmR1owA52+DX/JlOXYlv
AG2Y7sVnC0Al6APlecA89s6N2j7R868gpcvy2rSaWYqs9dtpfVSRs9PRbo6U5Bsq
9u60tTlPFI6+HskAzAUwwIIid+mAvIrxHtBUzlZU+tSphMRXIbaOQHY3Jxq1Az40
7ATylOKLZPkcCMTb3JjZBI+Ltjr/FejtkOU/o+MLTHSUwb4Ev85iKOMxFsfh/0rS
qRuOK1SuNQruRQflKDuP/fN7jPiMvxoisaN7MLVK7GLgdd4u6B0s6KAxWHQYxD9S
J8nmHR6Uy/K2NgRwwG+37PEG25WoTuq4iAc3KjqAYpjQIWCu9SU6B4FYiPNYIU4=
=LIft
-----END PGP SIGNATURE-----



More information about the OTR-users mailing list