Corrupting files
zvrba at globalnet.hr
zvrba at globalnet.hr
Mon Jun 12 12:50:50 CEST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote:
>
> Brute force... trying every possible key on a message until the
>
Brute force both in the key length and the size of the alphabet.
>
> decrypted message makes sense. Since in theory the corrupted message
> could be the result of encrypting the message with a different key,
> brute force may yield a different key, but in theory, this added
> encryption does not add any security.
>
I wouldn't agree with this reasoning. If a single character is changed,
this might correspond to encryption with a different key. But all the
other blocks are still encrypted with the _same_ key. Brute-forcing the
key of the corrupted block won't help in decrypting the rest of the
message.
Then again, I might be wrong :)
Best regards,
Zeljko.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEjUcKFtofFpCIfhMRA+ZEAJwJBduW0byyJLW7FN+6GGJ/i5aybQCeO7b0
oVy2wol3sYgR6GFrtBrdQOQ=
=0QCO
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list