How to verify the file was successfully encrypted...

George Ross gdmr at inf.ed.ac.uk
Thu Jul 13 09:24:33 CEST 2006


> > BTW, why are you encrypting these files anyway?  If someone broke into 
> > your computer they could just steal the crypto key too.
> 
> Excellent question!  Truth be told, as soon as they are encrypted,
> they're being moved to another server in another location, and then are
> being burned to CD and moved to a safety deposit box.

How about if you append a hash of the file to the file, and encrypt that 
too?  Then have the remote machine do the trial decrypt-and-check-hash.  If 
all is OK the remote machine can then tell the local one to delete the 
original; and if it's not OK, it can scream at you.
-- 
Dr George D M Ross, School of Informatics, University of Edinburgh
    Kings Buildings, Mayfield Road, Edinburgh, Scotland, EH9 3JZ
Mail: gdmr at inf.ed.ac.uk   Voice: +44 131 650 5147   Fax: +44 131 667 7209
 PGP: 1024D/AD758CC5  B91E D430 1E0D 5883 EF6A  426C B676 5C2B AD75 8CC5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 238 bytes
Desc: not available
Url : /pipermail/attachments/20060713/fefbe97a/attachment.pgp


More information about the Gnupg-users mailing list