known plain-text attacks
Atom 'Smasher'
atom-gpg at suspicious.org
Mon Dec 15 23:50:09 CET 2003
if two or more recipients are specified in an encrypted message, they all
share a single symmetric session-key, which is asymmetrically encrypted
using each of their public keys.... (as i understand it)
if one of those recipients wanted to crack the private key of one of the
other recipients, would it be helpful that the session-key is known? does
that facilitate a known plain-text attack? does it matter which asymmetric
encryption algorithm is used?
are the algorithms vulnerable to this? does the implementation makes this
attack unlikely?
...atom
_______________________________________________
PGP key - http://smasher.suspicious.org/pgp.txt
3EBE 2810 30AE 601D 54B2 4A90 9C28 0BBF 3D7D 41E3
-------------------------------------------------
"MEATLESS" - US government standards allow the use of the
word "Meatless" to allow up to 2% animal product and/or
meat content.
More information about the Gnupg-users
mailing list