Member-only story
Reviewing NIST Guidance for ECC Curves for GPG Encryption Keys
Ensuring you are configuring encryption algorithms correctly using security standards
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
⚙️ Check out my series on Automating Cybersecurity Metrics | Code.
🔒 Related Stories: Encryption | Cybersecurity
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I had to revisit my GPG key today and wanted to make sure I’m using the appropriate configuration. I wrote in a prior post how to configure up a key for GPG to encrypt documents in email showing use of an RSA key but mentioned that some had stated that RSA was not the best choice. An ECC (Electric Curve Cryptography) key would be better.
After that post some researchers announced a new vulnerability involving SSH and RSA encryption.
I explained how to use ECC on AWS instead of RSA. AWS only gives you one choice when you are setting up your ECC key for encryption so you use it. I wrote about some ways to govern the SSH algorithm…