The symmetric ciphers

Paul R. Ramer free10pro at gmail.com
Tue Sep 10 12:58:13 CEST 2013


Philipp Klaus Krause <pkk at spth.de> wrote:
>I wonder if it would be a good idea to have an option to combine
>symmetric ciphers, e.g. users could state a preference list like this:
>
>TWOFISH+AES256 3DES+BLOWFISH+AES AES 3DES
>
>The meaning of A+B would be to encrypt using A first, and then encrypt
>the result using B with a different key. Assuming it takes effort a to
>break cipher A and effort b to break cipher b, this should result in
>effort at least max(a, b) needed to break A+B. And with uncertainity
>about possible weaknesses in individual ciphers, this seems like a
>reasonable measure to me.
You may just prefer to use a key with a larger size and a better password. But if you do want to do this, I am sure that you could write a script or program that could take advantage of GnuPG for this purpose.

Cheers,

--Paul
-- 
PGP: 0x3DB6D884
PGP Fingerprint: EBA7 88B3 6D98 2D4A 
E045  A9F7 C7C6 6ADF 3DB6 D884
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20130910/cf855883/attachment.html>


More information about the Gnupg-users mailing list