Hi,
When you have to create a random public/private key then your keyboard input timing is used to make it really random and not pseudo-randum.
(a computer without 'analog-input' can only create a pseudo-randum number)
Now my question is how can these session key's be secure if they are pseudo random?
or aren't they pseudo random?
And why is there no possibility to disable the use of a session key?
(I know you won't be able to sent to multiple persons then)
When the session key method is hacked then the public/private key has no meaning.
Knowing that a key can not be stronger than a brute force attack I find the below FAQ text rather funny.
A 3000 bit RSA-key or DH-key are equal to a 128 bit IDEA-key!!
meanig a 3000 RSA or DH has at least 3000-128 useless bits.
Hope someone can shine some light on these questions.
Thanks []
Ken
Part of this FAQ: :
"PGP 7.0 introduces a new symmetric encryption option - Twofish, and PGP 7.0.1 additionally introduces AES. IDEA and CAST are 128 bit algorithms that are considered equivalent to 3000* bit RSA and DH keys; Triple DES is 168 bit, with a reported effective key size of 112 bits. Twofish and AES are 256 bit algorithms, and considered equivalent to a 15000 bit RSA or DH key."
When you have to create a random public/private key then your keyboard input timing is used to make it really random and not pseudo-randum.
(a computer without 'analog-input' can only create a pseudo-randum number)
Now my question is how can these session key's be secure if they are pseudo random?
or aren't they pseudo random?
And why is there no possibility to disable the use of a session key?
(I know you won't be able to sent to multiple persons then)
When the session key method is hacked then the public/private key has no meaning.
Knowing that a key can not be stronger than a brute force attack I find the below FAQ text rather funny.
A 3000 bit RSA-key or DH-key are equal to a 128 bit IDEA-key!!
meanig a 3000 RSA or DH has at least 3000-128 useless bits.
Hope someone can shine some light on these questions.
Thanks []
Ken
Part of this FAQ: :
"PGP 7.0 introduces a new symmetric encryption option - Twofish, and PGP 7.0.1 additionally introduces AES. IDEA and CAST are 128 bit algorithms that are considered equivalent to 3000* bit RSA and DH keys; Triple DES is 168 bit, with a reported effective key size of 112 bits. Twofish and AES are 256 bit algorithms, and considered equivalent to a 15000 bit RSA or DH key."