The wording in the Cryptography Standard states the minimum for RSA should be 2048. That meets the minimal requirements for compliance - namely with various FIPS/FedRAMP/NIST related standards and practices. So it is not "set it to 2048" it is "at least 2048, higher is allowed".
Frankly everywhere I have a choice when I am using digital signatures I always use the maximum value I can set it to.
Mark Loveless (a564e90d) at 09 Mar 22:36
Fixed spelling error
💡 Provide a detailed answer to the question on why this change is being proposed, in accordance with our value of Transparency.Please add the details saying why, not just what in this section. Example:
We have discussed the topic in Slack - (copy of Slack conversation). The current process is not efficient, this MR makes the description of X more clear, and helps move Y forward.
Minor updates to cryptography standard. The issues surrounding post quantum cryptography are outlined, a few new terms in that space have been linked to, and I've mentioned the "harvest now, decrypt later" attack scenario specifically. I think we still have time but wanted to at least get it in the standard as a potential catalyst for quicker post-quantum adoption.
Please verify the check list and ensure to tick them off before the MR is merged.
Mark Loveless (1aaa26e1) at 09 Mar 19:58
Updates to stay current