The symmetric ciphers
Paul R. Ramer
free10pro at gmail.com
Tue Sep 10 12:58:13 CEST 2013
Philipp Klaus Krause <pkk at spth.de> wrote:
>I wonder if it would be a good idea to have an option to combine
>symmetric ciphers, e.g. users could state a preference list like this:
>TWOFISH+AES256 3DES+BLOWFISH+AES AES 3DES
>The meaning of A+B would be to encrypt using A first, and then encrypt
>the result using B with a different key. Assuming it takes effort a to
>break cipher A and effort b to break cipher b, this should result in
>effort at least max(a, b) needed to break A+B. And with uncertainity
>about possible weaknesses in individual ciphers, this seems like a
>reasonable measure to me.
You may just prefer to use a key with a larger size and a better password. But if you do want to do this, I am sure that you could write a script or program that could take advantage of GnuPG for this purpose.
PGP Fingerprint: EBA7 88B3 6D98 2D4A
E045 A9F7 C7C6 6ADF 3DB6 D884
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Gnupg-users