--list-only and symmetric encryption (fwd)
atom at suspicious.org
Tue Jul 6 17:41:15 CEST 2004
On Wed, 30 Jun 2004, David Shaw wrote:
> On Tue, Jun 29, 2004 at 11:46:53PM -0400, Atom 'Smasher' wrote:
> > i'm curious how that works... i understand how a message can be encrypted
> > to multiple public keys, since the bulk encryption is only done using one
> > key. i don't understand how a message can be efficiently ("efficiently",
> > meaning that the message is only encrypted once) encrypted to multiple
> > symmetric keys.
> It works the same way that it does with public keys. The data is
> encrypted using a random session key, then that session key is
> encrypted using the passphrase. If you want to use multiple
> passphrases, just encrypt the random session key to as many
> passphrases as you like.
so, GnuPG can read, but not create these messages? are there plans handle
creation? or would it have to be done by performing packet-surgery with
if only a single symmetric passphrase is used, is there still a session
key encrypted with the symmetric key? (i only have text access right now,
and can't get to a copy of the RFC).
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
"We don't know if lobsters feel pain... [but] since
pain is a perception, we often don't know whether
people feel it either"
-- Prof. Edward Kravitz,
Harvard Medical School
More information about the Gnupg-devel