--override-session-key $PASS simple brute force attack vulnerability?
john clark
lurq_gnupg@yahoo.com
Mon Jul 15 11:54:01 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --override-session-key $PASS simple brute force
attack vulnerability?
hi guys,
Call me naive, but...
I noticed that on --show-session-key option, the
structure of the
session key is composed of the cipher-algo code plus
lotsa random
numerals and upper case characters, but no special
characters.
gpg: session key:
"9:4653465768797E97F6863768674FG464675676689DBFE3SD599B7662D4DF98B1"
Then there is a possibility to brute force a
particular
public-key encrypted message via the session key
without having the
secret-key, right?
And if this is the case, then it's much better to use
long cipher
algos like Rijndael256 and Twofish to avoid this risk?
- - jed
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE9Lb3UluOtB0iIhFgRAp1jAKC3dW2KQ37yEwmSQ3oFhthBd4YbTACaAsxk
lGYrXo9GGA8f5ZmU4STxuxg=
=L1Pa
-----END PGP SIGNATURE-----
__________________________________________________
Do You Yahoo!?
Yahoo! Autos - Get free new car price quotes
http://autos.yahoo.com