Corrupting files

zvrba at globalnet.hr zvrba at globalnet.hr
Mon Jun 12 12:50:50 CEST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote:
> 
> Brute force... trying every possible key on a message until the
>
Brute force both in the key length and the size of the alphabet.

>
> decrypted message makes sense. Since in theory the corrupted message
> could be the result of encrypting the message with a different key,
> brute force may yield a different key, but in theory, this added
> encryption does not add any security.
> 
I wouldn't agree with this reasoning. If a single character is changed,
this might correspond to encryption with a different key. But all the
other blocks are still encrypted with the _same_ key. Brute-forcing the
key of the corrupted block won't help in decrypting the rest of the
message.

Then again, I might be wrong :)

Best regards,
  Zeljko.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEjUcKFtofFpCIfhMRA+ZEAJwJBduW0byyJLW7FN+6GGJ/i5aybQCeO7b0
oVy2wol3sYgR6GFrtBrdQOQ=
=0QCO
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list