PGP inconsistency

120 pts.
Tags:
Encryption
Encryption keys
PGP Security
Any chain is as week as its weakest link. So, what is PGP's point of using 2048+ bit key pairs and 100+ character passphrases while using a 256 bit key to encrypt the message?


Software/Hardware used:
Symantec Endpoint Encryption
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • TheRealRaven
    Why wouldn't it? Given that one basic estimate of a bit over "a billion billion years" of supercomputer time to crack AES-128 that used a strong pass-phrase, it seems a little pointless to think about possible problems of AES-256 (other than using weak keys).

    One justification for any encryption methodology is the question "Is it worth the cost of doubling processing work if the risk is reduced from .00001 to .000001?" If any risk is already small enough to be negligible, why invest more? What is the cost/benefit ratio?

    But this is a basic research question and the study of Google results gives answers. There doesn't seem to be an actual technical problem we can help solve.
    36,095 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: