Mailing List Archive

RSA key-gen???
I downloaded GnuPG 1.0.3 thinking I'd finally be able to have RSA-based
keys given that the patent has expired. However, it appears that you still
can't generate RSA keys using GPG. I looked through the keygen code and
removed a few #if 0 comments around RSA key generation, but as expected,
generating an RSA-key with this code base results in a segmentation fault.

Is this still not possible or is there a devel version that actually has
this feature?

--Chris


--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
Re: RSA key-gen??? [ In reply to ]
On Tue, Sep 19, 2000 at 11:45:58AM -0700, Christopher Smith wrote:
> However, it appears that you still can't generate RSA keys using GPG.

From "NEWS":

Noteworthy changes in version 1.0.3 (2000-09-18)
------------------------------------------------
[...]
* RSA is supported. Key generation does not yet work but will come
soon.
[...]


Best regards,
Dan 'you read the docs, did ya?' iel

--
----------------------------------------------------------------------
entire systems GmbH | droesen@entire-systems.com
Internet Services | Phone: +49 2624 9550-55
Ferbachstrasse 12 | Fax: +49 2624 9550-20
D-56203 Hoehr-Grenzhausen | http://www.entire-systems.com/
----------------------------------------------------------------------

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
Re: RSA key-gen??? [ In reply to ]
On Tue, 19 Sep 2000, Christopher Smith wrote:

> I downloaded GnuPG 1.0.3 thinking I'd finally be able to have RSA-based
> keys given that the patent has expired. However, it appears that you still
> can't generate RSA keys using GPG. I looked through the keygen code and


Why do you thinlk RSA is better that DSA/ElGamal?


Werner


--
Werner Koch GnuPG key: 621CC013
OpenIT GmbH http://www.OpenIT.de

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
Re: RSA key-gen??? [ In reply to ]
-----BEGIN PGP SIGNED MESSAGE-----

Big Brother tells me that Werner Koch wrote:
> On Tue, 19 Sep 2000, Christopher Smith wrote:
>
> > I downloaded GnuPG 1.0.3 thinking I'd finally be able to have RSA-based
> > keys given that the patent has expired. However, it appears that you still
> > can't generate RSA keys using GPG. I looked through the keygen code and
>
>
> Why do you thinlk RSA is better that DSA/ElGamal?

Why do you think ElGamal is better than RSA?

- --
"In God We Trust. Jack McKinney
Everyone else we monitor." jackmc@lorentz.com
-Former NSA employee http://www.lorentz.com
F4 A0 65 67 58 77 AF 9B FC B3 C5 6B 55 36 94 A6

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBOcoF40Zx0BGJTwrZAQHh0QQAhfiRdoL/fwpKjBdIyJ0EzFONV7Jdw5IQ
87TxwwTgS2UYt6X10anevKiMBfa7ayRqnZ71h+nTUtaJ0IqZ401fa3wkH9jqzjz7
95hOxlZUgP6fH5Doz3TXZRbU15DeAbVLHHUQId/ahEagAKhk8lD+I9If4RWcM74y
bR65qE+3yMU=
=Jl8Q
-----END PGP SIGNATURE-----

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
RE: RSA key-gen??? [ In reply to ]
For a start: Elgamal keys are (currently thought to be...) stronger than
RSA keys of the same size?

(see for example: http://www.scramdisk.clara.net/pgpfaq.html#SubRSADH).


Regards,

Sam Simpson
http://www.scramdisk.clara.net/

> -----Original Message-----
> From: Jack McKinney [mailto:jackmc-gnupg-users@lorentz.com]
> Sent: 21 September 2000 13:54
> To: Simpson, Sam
> Subject: Re: RSA key-gen???
>
> Big Brother tells me that Werner Koch wrote:
> > On Tue, 19 Sep 2000, Christopher Smith wrote:
> >
> > > I downloaded GnuPG 1.0.3 thinking I'd finally be able to
> have RSA-based
> > > keys given that the patent has expired. However, it
> appears that you still
> > > can't generate RSA keys using GPG. I looked through the
> keygen code and
> >
> >
> > Why do you thinlk RSA is better that DSA/ElGamal?
>
> Why do you think ElGamal is better than RSA?
>
> - --
> "In God We Trust. Jack McKinney
> Everyone else we monitor." jackmc@lorentz.com
> -Former NSA employee http://www.lorentz.com
> F4 A0 65 67 58 77 AF 9B FC B3 C5 6B 55 36 94 A6
--------------------------

Certain opinions expressed in this mail may be personal and may not be shared by Medical Insurance Agency Ltd or subsidiaries.

The information contained in this e-mail is confidential and may also be legally privileged. It is intended only for the stated addressee(s) and access to it by any other person is unauthorised. If you are not an addressee you must not disclose, copy, circulate or in any other way use or rely on the information contained in this email. Such unauthorised use may be unlawful. If you have received this e-mail in error then please inform 'postmaster@mia.co.uk' immediately and delete it and all copies from your system.

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
Re: RSA key-gen??? [ In reply to ]
-----BEGIN PGP SIGNED MESSAGE-----

Big Brother tells me that Simpson, Sam wrote:
> For a start: Elgamal keys are (currently thought to be...) stronger than
> RSA keys of the same size?
>
> (see for example: http://www.scramdisk.clara.net/pgpfaq.html#SubRSADH).

This document is a good example of what I was talking about.
Go to this link to verify the following:

Paragraph 3:
% It is, in fact, slightly harder to compute discrete logs modulo an
% appropriate prime than to factor a "hard" integer of the same size -
% so RSA would appear slightly weaker than DHP [Odl95], [Sch97c]. From
% [Sch99a]: "RSA users have to choose a larger key size those using than
% DH over GF(p), for equivalent security.

Paragraph 7:
% Another relevant quote [Wie98]: "The most important factor in choosing a
% public-key technology is security. Based on the best attacks known, RSA
% at 1024 bits, DSA and Diffie-Hellman at 1024 bits, and elliptic curves
% at about 170 bits give comparable levels of security.


"slightly weaker". "comparable levels of security".

I point out that this part of the article is talking about DH, not
ElGamal. They are NOT the same thing. DH is a methodology of key exchange
that depends on selection of a finite group. From earlier in the FAQ:

% ... ElGamal [ElG85], which is a public-key encryption variant of the
% Diffie-Hellman Problem (DHP)

...

% The security of the DH system is based upon the DH Problem (DHP). This
% problem is conjectured (but not proven) to be equivalent to the Discrete
% Logarithm Problem (DLP)

...

% DHP is equivalent to the DLP under the "Diffie-Hellman assumption"


Earlier in the article, it talks about the downsides of DH:

% b.Signature Strength. Current implementations of DH only offer DSS as
% the signature algorithm. This limits key length to 1,024-bits which may,
% on its own, be insufficient for long term security. RSA signatures utilise
% a key of up to 2048 or 4096 bits (depending on the implementation).

The only significant entries in the contrast (the downside of RSA) are:

% d. RSA offers less "security-per-bit" of key material than both DH/DSS.
% e. DH appears to be based upon more solid mathematical theory (see the
% section "Any recent developments?" for details).

For my opinion on these, see the earlier quotes. As for the other
downsides, a) is defunct as of Sep 6; b) does not apply if you don't
choose to shoot yourself in the foot as it describes (key signing and
trust prevent a man-in-the-middle exploit of this); c) does not apply
in a document signing situation (though ssh has been using it anyway);
and f) is an implementation issue. What if _I_ want to save the
transactions. With DH, I can encrypt the data on my end, but then
someone could _still_ coerce my encryption key...


I could go on for a while on this. I have not taken the time yet
to study ElGamal mathematically (I am a mathematician), so I have no
inherent opinion. The opinions I give above are just a demonstration
of how the FAQ is dancing around the security issue. Somewhere in
that FAQ (I need to look again) is a paragraph that really made me
wary of using GnuPG. If I find it, I'll post it.


- --
"Of course its your fault. Everything that goes wrong Jack McKinney
here is your fault. It says so in your contract." jackmc@lorentz.com
-Quark to his brother Rom, DS9 http://www.lorentz.com
F4 A0 65 67 58 77 AF 9B FC B3 C5 6B 55 36 94 A6

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBOcohJEZx0BGJTwrZAQFPtwP+If0CYDOmB5p2A51Suf0BbJbh3O8JZdV6
gGTxwsux6yehoSg6zNWqD8mz5kTruAxSV/ItJSOlct/pSC445SCGCEHGioFdIdwv
/KDy3XDrnW9vO/uICIcy696aTcFue2HYYotY0gHBwtcfq3EmxtFUsfgOS+jsNCHv
jhWlUxaYziw=
=UKZi
-----END PGP SIGNATURE-----

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org
Re: RSA key-gen??? [ In reply to ]
On Thu, 21 Sep 2000, Jack McKinney wrote:

> > Why do you thinlk RSA is better that DSA/ElGamal?
>
> Why do you think ElGamal is better than RSA?

I am talking about DSA with the clear advantage that the signature
is really small.

Werner


--
Werner Koch GnuPG key: 621CC013
OpenIT GmbH http://www.OpenIT.de

--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org