summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorJoost Rijneveld <joost@joostrijneveld.nl>2018-02-05 13:01:33 +0100
committerSybren A. Stüvel <sybren@stuvel.eu>2018-02-05 13:14:39 +0100
commitb738e66ef7ca1b5fc024269e489e6b65319efa1d (patch)
tree156193a82d78c93c21de8a1410d31962b738eba0 /doc
parent2a020f358b4e8712d2388f12044ec3646be0a3c0 (diff)
downloadrsa-git-b738e66ef7ca1b5fc024269e489e6b65319efa1d.tar.gz
Remove keysize requirements / recommendations
This library is probably not the right place to recommend key sizes or have discussions about the relation between key sizes and hash function outputs.
Diffstat (limited to 'doc')
-rw-r--r--doc/usage.rst26
1 files changed, 0 insertions, 26 deletions
diff --git a/doc/usage.rst b/doc/usage.rst
index 980f99c..b1244d4 100644
--- a/doc/usage.rst
+++ b/doc/usage.rst
@@ -90,32 +90,6 @@ generate them for you, then load them in your Python code. OpenSSL
generates a 4096-bit key in 3.5 seconds on the same machine as used
above. See :ref:`openssl` for more information.
-Key size requirements
----------------------
-
-Python-RSA version 3.0 introduced PKCS#1-style random padding. This
-means that 11 bytes (88 bits) of your key are no longer usable for
-encryption, so keys smaller than this are unusable. The larger the
-key, the higher the security.
-
-Creating signatures also requires a key of a certain size, depending
-on the used hash method:
-
-+-------------+-----------------------------------+
-| Hash method | Suggested minimum key size (bits) |
-+=============+===================================+
-| MD5 | 360 |
-+-------------+-----------------------------------+
-| SHA-1 | 368 |
-+-------------+-----------------------------------+
-| SHA-256 | 496 |
-+-------------+-----------------------------------+
-| SHA-384 | 624 |
-+-------------+-----------------------------------+
-| SHA-512 | 752 |
-+-------------+-----------------------------------+
-
-
Encryption and decryption
-------------------------