The symmetric ciphers

Peter Lebbing peter at
Thu Oct 31 20:23:10 CET 2013

On 31/10/13 16:37, vedaal at wrote:
> The advantage is, that if it should ever be possible to brute force the
> keyspace of one key, then NONE of the possible elements of the keyspace
> (including the *correct* key) will result in an identifiable *correct*
> plaintext. It will only result in random ciphertext.

Then again: If brute forcing a key costs you all the energy in this solar
system, you don't have any light to read the decrypted message by. And that's
what we're talking about here.

So: forget about brute-forcing.



I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <>

More information about the Gnupg-users mailing list