-----BEGIN PGP MESSAGE-----
hF4DqiTMgbiu0IsSAQdAIxIXDZNcIaFZZGs3nr+2bd3yzmDQkBl7eksKX5ETqRIw
3u7QaS5QiuVOr1ZF7rKAx5hetVbe2NfvByBLs8Xw5hVI0VDGZ2/L62jf0QXnrWuk
0sAiAVNO9kiUE9BvGsvc4ksmZQ76Q7QjFysUe+flDJn5fXTM2nwE2D639PPiigRu
puCOR/YolulNzHmK0wP7XV80r4+9p7Tz3wqfOja1kODModoclYnfh+IYgC5KXxtA
VdzgFLpBh7Wnt6WYdTlIrg/YBOOh/xcAMS+apKwcd32OJgWhdodXlKkMSF5Fo6Tw
23SUsNSovl+rCkNZZXROwjfMfuXiwlyr8zB3jEi5RCNrPHWaArQfFdCNnbxz+QqU
F5a3fDJVa7A9FS96ZvQ9cYUNNZNKRPRsS2xcTwpExyMUnX9J6A==
=elyn
-----END PGP MESSAGE-----
> On Monday, 10. July 2023 1:08, Robert J. Hansen via Gnupg-users
> [/webmail/send?to=gnupg-users@gnupg.org] wrote:
>
>
>
> > How do I upp the limit of the RSA-key to 32768?
>
> First, come up with a reason why you need one.
>
> A 2048-bit key is hypothesized to possess about 112 bits of entropy; a
> 3072-bit key, about 128; a 16k-bit, about 256. You very rapidly reach a point
> of dramatically diminishing returns. A 32k key gives you essentially nothing
> in terms of resistance to cryptanalysis, while making it impossible for the
> rest of the OpenPGP ecosystem to work with you because your public certificate
> is so unreasonably large.
>
> > The TailsOS team has a key that's wy over 16384-bit.
>
> I suggest filing a bug report with them and asking them why they ignore the
> best practices of cryptography.
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> https://lists.gnupg.org/mailman/listinfo/gnupg-users