[24524] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Moving from 1024-bit -> 2048-bit key.

daemon@ATHENA.MIT.EDU (Adam Shostack)
Mon Dec 26 15:21:38 1994

From: Adam Shostack <adam@bwh.harvard.edu>
To: grmorgan@freenet.vcu.edu
Date: Mon, 26 Dec 94 14:59:21 EST
Cc: entropy@IntNet.net, cypherpunks@toad.com
In-Reply-To: <9412261907.AA10983@freenet.vcu.edu>; from "Greg Morgan" at Dec 26, 94 2:07 pm

	Why revoke the old one?  If I want to send a message I don't
think needs 2048 RSA bits of security, why bother with it?  I have
little doubt the FBI would get your key from your computer at 1024
bits.  Thus, the effort needed to compromise a key does not change as
one moves from a 1024 to a 2048 bit key.

	Threat models are really helpful.  They become more helpful as
one acurately assesses ones enemies.  Ronald Kessler wrote a book
called The FBI.  Its fairly evenhanded examination of the post-Hoover
bureau.  He does gloss over DT & Waco; they occured as he was
finishing the book.  Reading it will give you good insight into the
way the FBI, and its agents, work.  (0-671-78657-1)


Adam


| >Once I've generated a 2048-bit key, how can I update my key on the 
| >keyservers?
| >
| 
| First you need to generate a key revocation for your old key
| and post that to the servers.  Then just email your new key to
| the server.

-- 
"It is seldom that liberty of any kind is lost all at once."
						       -Hume

home help back first fref pref prev next nref lref last post