1 |
Mick wrote: |
2 |
> I have looked around and have found confusing info regarding which is a better |
3 |
> key cipher to use for ssh authentication. Some say that RSA is widely |
4 |
> considered more secure than DSA. Some say that it doesn't really matter, as |
5 |
> long as you use a large enough bits setting in creating your key. RSA takes |
6 |
> longer to create but it takes less time to authenticate on the server and DSA |
7 |
> is the other way around. Not sure what to believe and I'd rather not be |
8 |
> guessing which one is best |
9 |
|
10 |
DSA keys are always 1024 bits, as this is mandated by the standard. RSA |
11 |
keys can have variable length. From "man ssh-keygen": |
12 |
|
13 |
-b bits |
14 |
Specifies the number of bits in the key to create. For RSA keys, |
15 |
the minimum size is 768 bits and the default is 2048 bits. Gen- |
16 |
erally, 2048 bits is considered sufficient. DSA keys must be |
17 |
exactly 1024 bits as specified by FIPS 186-2. |
18 |
|
19 |
Another argument in favor of RSA is mentioned in the PuTTY FAQ: |
20 |
|
21 |
http://www.chiark.greenend.org.uk/~sgtatham/putty/faq.html#faq-dsa |
22 |
|
23 |
Personally, I use RSA keys because I want to use a 2048 bit key length. |
24 |
|
25 |
-- Remy |
26 |
|
27 |
|
28 |
Remove underscore and suffix in reply address for a timely response. |
29 |
|
30 |
-- |
31 |
gentoo-user@g.o mailing list |