simple-sk-checksum
Stephen Paul Weber
singpolyma at singpolyma.net
Fri Jan 4 22:37:14 CET 2013
The manpage for gpg sez:
> Secret keys are integrity protected by using a SHA-1 checksum. This
> method is part of the upcoming enhanced OpenPGP specification but GnuPG
> already uses it as a countermeasure against certain attacks. Old
> applications don't under‐ stand this new format, so this
> option may be used to switch back to the old behaviour. Using this option
> bears a security risk.
Does anyone know what the actual security risk is? Using a weaker checksum
obviously makes it easier to forge data, but in this case the data being
forged is just the secret parts of a secret key. What are the attack
vectors there?
--
Stephen Paul Weber, @singpolyma
See <http://singpolyma.net> for how I prefer to be contacted
edition right joseph
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: </pipermail/attachments/20130104/6ec3dbd4/attachment.pgp>
More information about the Gnupg-users
mailing list