known plain-text attacks

Atom 'Smasher' atom-gpg at suspicious.org
Mon Dec 15 23:50:09 CET 2003


if two or more recipients are specified in an encrypted message, they all
share a single symmetric session-key, which is asymmetrically encrypted
using each of their public keys.... (as i understand it)

if one of those recipients wanted to crack the private key of one of the
other recipients, would it be helpful that the session-key is known? does
that facilitate a known plain-text attack? does it matter which asymmetric
encryption algorithm is used?

are the algorithms vulnerable to this? does the implementation makes this
attack unlikely?


	...atom

 _______________________________________________
 PGP key - http://smasher.suspicious.org/pgp.txt
 3EBE 2810 30AE 601D 54B2 4A90 9C28 0BBF 3D7D 41E3
 -------------------------------------------------

	"MEATLESS" - US government standards allow the use of the
	 word "Meatless" to allow up to 2% animal product and/or
	 meat content.




More information about the Gnupg-users mailing list