LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-12-2010, 07:11 AM   #1
fakie_flip
Senior Member
 
Registered: Feb 2005
Location: San Antonio, Texas
Distribution: Gentoo Hardened using OpenRC not Systemd
Posts: 1,495

Rep: Reputation: 85
Encryption


Why can I not create keys with gpg with a key length longer than 4096 bits long? Is this due to government laws? I know the government has attempted and still is the use of encryption.
 
Old 02-12-2010, 07:19 AM   #2
acid_kewpie
Moderator
 
Registered: Jun 2001
Location: UK
Distribution: Gentoo, RHEL, Fedora, Centos
Posts: 43,417

Rep: Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984Reputation: 1984
Who's government? American laws only apply to Americans, thankyou. A 4096 bit key is massively secure, no risk of it being broken for many decades, and I'd imagine there is just no benefit in using anything longer, or rather, the computational cost of doing the encryption with any regularity would outweigh the benefits.
 
Old 02-12-2010, 07:30 AM   #3
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 681Reputation: 681Reputation: 681Reputation: 681Reputation: 681Reputation: 681
Probably because 2^4096 represents a number (10^1252) larger than the number of electrons in the galaxy. ( A guess on my part )
You wouldn't need to use a larger key, and so the programmers don't bother since it would just decrease speed unnecessarily. And they want to use standard key lengths for the program to be useful.

Around 1024 bits, you are relying on how long an attack would take using current technology. However, around 4096 bits (10^1252), the number of electrons needed by a computer to crack a cypher are impossible to obtain, and the number of atoms needed to store rainbow tables for example is impossible as well. Even if you only needed one electron or photon per guess.

The original DES standard was crackable by some agencies, but the 8086 in use at the time wasn't powerful enough for anything stronger. The DES standard was by design a stop gap 5 year standard, since it was known that processors would be more powerful in the near future.

Last edited by jschiwal; 02-12-2010 at 07:36 AM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
encryption boobymonster Linux - Desktop 1 07-30-2009 10:57 AM
Linux password encryption and data encryption Tux-Slack Programming 4 06-20-2007 06:46 AM
Encryption craigs1987 Programming 1 05-01-2005 11:47 PM
Encryption shaf.rahman Red Hat 1 04-19-2005 02:59 PM
Mandrake 9.0 Wireless Works without encryption.. does not with encryption topcat Linux - Wireless Networking 3 05-04-2003 08:47 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:32 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration