"Daniel A. Nagy" <nagydani@epointsystem.org> writes: >generating a new key with the same 64-bit key ID as an existing key is on the >very far end of the realm of feasibility. That should be: generating a *secure* new key with the same 64-bit key ID as an existing key is on the very far end of the realm of feasibility. If you don't mind that your key's weak then it's not that much more work than just finding a 64-bit collision. Peter.