-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1,SHA256 Mon Jun 7 15:11:47 EDT 2010 In light recent new attacks against SHA-1 [1,2], the NIST guidance on 1024 bit keys and SHA-1 hashes [3,4], and Debian migration away from 1024 bit keys [5], I have decided to move to a new OpenPGP key of a larger size of 4096 bits. As such, I will be slowly transitioning away from my old key (75C024C8). The old key will continue to be valid for some time to come, but I'd prefer all new correspondence to use the new one. I'll also be switching my outgoing signatures (email and code) onto the new key. For this to work well, I'd like my new key to be re-integrated into the web of trust. So, I've signed this message with both the old and the new keys, to certify the transaction. New key was generated using gpg (GnuPG) 1.4.10 (as shipped in Debian sid, architecture amd64). The old key was: pub 1024D/75C024C8 2003-05-11 Key fingerprint = 3BB6 E124 0643 A615 6F00 6854 8D11 4563 75C0 24C8 And the new key is: pub 4096R/62DA33FA 2010-06-07 Key fingerprint = C5B9 05F0 E8D9 FD96 68FF 366F A2DE 2350 62DA 33FA To fetch my new key from a public key server, you can simply do: gpg --keyserver pgp.mit.edu --recv-key 62DA33FA If you already know my old key, you can now verify that the new key is signed by the old one: gpg --check-sigs 62DA33FA If you don't already know my old key, or you just want to be double extra paranoid, you can check the fingerprint against the one above: gpg --fingerprint 62DA33FA If you are satisfied that you've got the right key, and the UIDs match what you expect, I'd appreciate it if you would sign my key: gpg --sign-key 62DA33FA Lastly, if you could upload these signatures, I would appreciate it. Please could you just upload the signatures to a public keyserver directly: gpg --keyserver pgp.mit.edu --send-key 62DA33FA Please let me know if there is any trouble, and sorry for the inconvenience. P.S. This transition notice was heavily based on [6] Thanks Yarik [1] http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf [2] http://www.debian-administration.org/users/dkg/weblog/48 [3] http://csrc.nist.gov/groups/ST/hash/statement.html [4] http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf [5] http://keyring.debian.org/creating-key.html [6] http://gagravarr.org/key-transition-2009-05-06.txt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkwNR/oACgkQjRFFY3XAJMjlUwCeK7BQGNq0f+PilYtYse2PM336 0x0An1byBa34JZ34vmk5c3cOYi5XM8umiQIbBAEBCAAGBQJMDUf6AAoJEKLeI1Bi 2jP6vo4P+JJFNSJ2xt5Ne+YGcSQyw+95Jj6Bm7H6lvmuJT4XyWf1evxC77R3RSJo ccmqz5UaM65UcsFHTWoBJI2bsNMJwLHYDHDOIHnu9YuJKhvkmWNV6vctoFSsdi44 O8Hu+NggzWEaJyvX6ODR9jlmAm2zyIUuHTIzIj5hRdRdzkInU0S0ygQ6nlse0ueg nLt5dvYKJUo8WGPxaVtmPKKU05CzXFmuRe2KV+v500v2DxGQUpIh+fCiRI3JVg6X HVfoViLp9drGoeZhOxR2EhGzkYObmP9yMuhTc91PpQNBEYm4GMFEBQ/8Abhe2lo7 KrJJkKnsLa3q5s9Chef8TTNCQqQxVv1cExufU5FkZltblRjPSsO5kr/H7AAmhZZO C8b9q6Mq6Ew7FfuUYwphJzOozeOk4DvzMySKnVup2rT6qZceaS5C4qpi65LMdTeO Ddk5PdwZHQ8gaCJpFwe1M+T/Qj4wBBO3COcicUWLDDIQUGHBzFLiNgYM3lK70d0i fz31gLFM6OsYTawkP4Plyt7BHcvmSJU6zgaac3515KZKXPPIYs2XnTs9KwPxYf2a inVutcrEK/xoHe7t/bJ2eFp1vodDlb5Cg2uQzB1TklE1kti5F8Dl43SfPEoVSHJS r3rEik1OAcqsHNH+Ifms6GYfJLy+19CQ9i0pwrSNGtWhVEo5Nck= =Lp66 -----END PGP SIGNATURE-----