What encryption algorithm do you prefer for asymmetric keys, specifically signing?
#cryptography #pgp #GPG #GnuPG
@waltercool Agreed, feel free to elaborate though.
@waltercool Oh that.. it isnt "weak" so much as needing special care.. It is just as strong as the others when handled properly and when using a key of adequate strength and all.
In short the problem is if a system uses a non-secure random value when generating the negotiation then over time it can expose the private key. However if it is secure random (which it should be anyway) it is secure.
Several services like SSH have it disabled by default if not removed from codebase.