Talk:OpenPGP

From Whonix
Jump to navigation Jump to search

separate keys for different uses

It appears to me that long-lived signing keys can be a risk. The longer the key lives and the more signatures it generates, the greater the probability of a duplicate m occuring (DSA). Also, the size of the key may have been appropriate at the time of its creation, but may not be considered secure many years later (e.g. the signing keys for Puttyarchive.org are only 1024 bits) Are these realistic concerns or am I jumping at shadows?

One way to solve this:

  1. generate a master signing key -- distribute this key as described in the wiki.
  2. generate a short-lived signing key and sign it with the master key, repeat each time the key expires.
  3. short-lived encryption keys can be managed the same way, with the limiting case being ephemeral keys.

The master key only signs the short-lived keys, so a duplicate m is far less likely.

Maybe this is what subkeys are all about. I'll have to dig into it more.