diff options
author | Joost Rijneveld <joost@joostrijneveld.nl> | 2018-02-05 13:01:33 +0100 |
---|---|---|
committer | Sybren A. Stüvel <sybren@stuvel.eu> | 2018-02-05 13:14:39 +0100 |
commit | b738e66ef7ca1b5fc024269e489e6b65319efa1d (patch) | |
tree | 156193a82d78c93c21de8a1410d31962b738eba0 /doc | |
parent | 2a020f358b4e8712d2388f12044ec3646be0a3c0 (diff) | |
download | rsa-git-b738e66ef7ca1b5fc024269e489e6b65319efa1d.tar.gz |
Remove keysize requirements / recommendations
This library is probably not the right place to recommend key sizes
or have discussions about the relation between key sizes and hash
function outputs.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/usage.rst | 26 |
1 files changed, 0 insertions, 26 deletions
diff --git a/doc/usage.rst b/doc/usage.rst index 980f99c..b1244d4 100644 --- a/doc/usage.rst +++ b/doc/usage.rst @@ -90,32 +90,6 @@ generate them for you, then load them in your Python code. OpenSSL generates a 4096-bit key in 3.5 seconds on the same machine as used above. See :ref:`openssl` for more information. -Key size requirements ---------------------- - -Python-RSA version 3.0 introduced PKCS#1-style random padding. This -means that 11 bytes (88 bits) of your key are no longer usable for -encryption, so keys smaller than this are unusable. The larger the -key, the higher the security. - -Creating signatures also requires a key of a certain size, depending -on the used hash method: - -+-------------+-----------------------------------+ -| Hash method | Suggested minimum key size (bits) | -+=============+===================================+ -| MD5 | 360 | -+-------------+-----------------------------------+ -| SHA-1 | 368 | -+-------------+-----------------------------------+ -| SHA-256 | 496 | -+-------------+-----------------------------------+ -| SHA-384 | 624 | -+-------------+-----------------------------------+ -| SHA-512 | 752 | -+-------------+-----------------------------------+ - - Encryption and decryption ------------------------- |