encryption algorithm

Matt D md123 at nycap.rr.com
Wed Dec 18 04:57:01 CET 2013

Hash: SHA1

On 12/17/2013 10:33 PM, Robert J. Hansen wrote:
> On 12/17/2013 9:41 PM, Matt D wrote:
>> OK, I see.  So . . . if brute force is impossible, then what sort
>> of an attack is possible?
> Too many to list.  Depends largely on your attacker's budget and
> the constraints of their operation.  For instance, if I don't care
> if you know I've compromised your traffic, I'll tie you to a chair
> and start swinging a pipe wrench at your kneecaps.  Cheap and
> effective.
> Or I can target your machine for compromise.  If I can trick you
> into visiting a particular URL I might be able to plant a
> remote-root on your desktop and gain control over it.  At that
> point it's easy to run a keylogger to intercept your passphrase,
> and easy to copy your private key off your desktop.
> Or I can hire a $5,000-a-night hooker.  I'm pretty sure that inside
> of a week you'd be willing to tell your new charming companion
> pretty much anything.  The KGB employed this against United States
> cipher clerks with amazing success.
> Or... etc.  The list goes on and on and on.  In fact, there are so
> many ways to gain access to your traffic that I think obsessing
> over whether the default should be 2048-bits or 3072-bits is ...
> it's like arguing over whether your security fence should be 100
> feet high or 120 feet high.  Either way you need to pay more
> attention to the guy who's digging a tunnel underneath it.

Lets assume I run Ubuntu live from USB stick or cd when I need secure
messaging so an attacker cannot predict what machine i will send my
message from and there will be nothing left on the machine.  The
encrypted message is captured but the adversary does not have access
to me.  What sort of attack has any chance to decrypt the message?
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/


More information about the Gnupg-users mailing list