Skip to content

Commit

Permalink
Remove keysize requirements / recommendations
Browse files Browse the repository at this point in the history
This library is probably not the right place to recommend key sizes
or have discussions about the relation between key sizes and hash
function outputs.
  • Loading branch information
joostrijneveld authored and sybrenstuvel committed Feb 5, 2018
1 parent 2a020f3 commit b738e66
Showing 1 changed file with 0 additions and 26 deletions.
26 changes: 0 additions & 26 deletions doc/usage.rst
Expand Up @@ -90,32 +90,6 @@ generate them for you, then load them in your Python code. OpenSSL
generates a 4096-bit key in 3.5 seconds on the same machine as used
above. See :ref:`openssl` for more information.

Key size requirements
---------------------

Python-RSA version 3.0 introduced PKCS#1-style random padding. This
means that 11 bytes (88 bits) of your key are no longer usable for
encryption, so keys smaller than this are unusable. The larger the
key, the higher the security.

Creating signatures also requires a key of a certain size, depending
on the used hash method:

+-------------+-----------------------------------+
| Hash method | Suggested minimum key size (bits) |
+=============+===================================+
| MD5 | 360 |
+-------------+-----------------------------------+
| SHA-1 | 368 |
+-------------+-----------------------------------+
| SHA-256 | 496 |
+-------------+-----------------------------------+
| SHA-384 | 624 |
+-------------+-----------------------------------+
| SHA-512 | 752 |
+-------------+-----------------------------------+



Encryption and decryption
-------------------------
Expand Down

0 comments on commit b738e66

Please sign in to comment.