<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sans-serif;"><div><div><div>+1 on enforcing >= 1024</div><div><br></div><div><br></div><div><div>--</div><div><font class="Apple-style-span" color="rgb(0, 0, 0)"><font class="Apple-style-span" face="Calibri">Jarret Raim </font></font></div><div><span style="font-family: Calibri;">@jarretraim</span></div><div><font class="Apple-style-span" color="rgb(0, 0, 0)"><font class="Apple-style-span" face="Calibri"><br></font></font></div></div></div></div><div><br></div><span id="OLK_SRC_BODY_SECTION"><div style="font-family:Calibri; font-size:11pt; text-align:left; color:black; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; PADDING-TOP: 3pt"><span style="font-weight:bold">From: </span> Terry Chia <<a href="mailto:terrycwk1994@gmail.com">terrycwk1994@gmail.com</a>><br><span style="font-weight:bold">Reply-To: </span> "<a href="mailto:cryptography-dev@python.org">cryptography-dev@python.org</a>" <<a href="mailto:cryptography-dev@python.org">cryptography-dev@python.org</a>><br><span style="font-weight:bold">Date: </span> Tuesday, February 11, 2014 at 9:42 AM<br><span style="font-weight:bold">To: </span> "<a href="mailto:cryptography-dev@python.org">cryptography-dev@python.org</a>" <<a href="mailto:cryptography-dev@python.org">cryptography-dev@python.org</a>><br><span style="font-weight:bold">Subject: </span> Re: [Cryptography-dev] RSA key generation -- minimum key size?<br></div><div><br></div><div><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><div>
+1 on enforcing >=1024 bits. There is no sane reason to use smaller keys really. <span></span><br><br>
On Tuesday, February 11, 2014, Alex Gaynor <<a href="mailto:alex.gaynor@gmail.com">alex.gaynor@gmail.com</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Hey all,
<div><br></div><div>The last major issue blocking landing RSA key generation is a discussion over whether or not to enforce a minimum key size for newly generated keys.</div><div><br></div><div>I am advocating for requiring that key_size be >= 1024. Here is why:</div><div><br></div><div>* Smaller keys are factorable (768 is known to be factored publicly, it's extremely likely even larger is factorable by nation states); there is basically no reason to use these keys.</div><div>* PyCrypto enforces a 1024 minimum, which means there is no difficulty in porting applications; as there would be if we used a larger minimum</div><div>* Loosening the check in the future is much easier, from a backwards compatibility perspective, then tightening it.</div><div><br></div><div>Thus, 1024 seems like a reasonable balance of these concerns.</div><div><br></div><div>How do other people feel?</div><div>Alex</div><div><div><br></div>
-- <br><div dir="ltr">"I disapprove of what you say, but I will defend to the death your right to say it." -- Evelyn Beatrice Hall (summarizing Voltaire)<br>
"The people's good is the highest law." -- Cicero<br><div>GPG Key fingerprint: 125F 5C67 DFE9 4084</div></div></div></div></blockquote></div></div></span></body></html>