--list-only and symmetric encryption (fwd)

Atom 'Smasher' atom at suspicious.org
Tue Jul 6 17:41:15 CEST 2004

On Wed, 30 Jun 2004, David Shaw wrote:
> On Tue, Jun 29, 2004 at 11:46:53PM -0400, Atom 'Smasher' wrote:

> > i'm curious how that works... i understand how a message can be encrypted
> > to multiple public keys, since the bulk encryption is only done using one
> > key. i don't understand how a message can be efficiently ("efficiently",
> > meaning that the message is only encrypted once) encrypted to multiple
> > symmetric keys.
> It works the same way that it does with public keys.  The data is
> encrypted using a random session key, then that session key is
> encrypted using the passphrase.  If you want to use multiple
> passphrases, just encrypt the random session key to as many
> passphrases as you like.

so, GnuPG can read, but not create these messages? are there plans handle
creation? or would it have to be done by performing packet-surgery with

if only a single symmetric passphrase is used, is there still a session
key encrypted with the symmetric key? (i only have text access right now,
and can't get to a copy of the RFC).


 PGP key - http://atom.smasher.org/pgp.txt
 762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808

	"We don't know if lobsters feel pain... [but] since
	 pain is a perception, we often don't know whether
	 people feel it either"
		-- Prof. Edward Kravitz,
		Harvard Medical School

More information about the Gnupg-devel mailing list