cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?
Faramir
faramir.cl at gmail.com
Fri Jan 31 01:19:37 CET 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
El 30-01-2014 18:15, Donald Morgan Jr. escribió:
> If you know a user has a signature that they use to always end a
> message with, does that data aid in the decryption of the file?
> Would this exploit be applicable to symmetric encryption methods as
> well?
I think padding helps to avoid that, but I'm not sure if gpg uses
padding at the symmetric encryption step.
Best Regards
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQEcBAEBCAAGBQJS6uwZAAoJEMV4f6PvczxALTgIAJjfxFm1mkl4GtmoFk33q/xg
fM7H+hE0NmpeUbNanGWplS8nTWftIHsqvLlo1Z9AVsn/hE+dDy4iNBZsi7hvwskG
my2RCj2lAh2oZSTL/SnKaiLUPUGc8+L8Isje94oR0n+nKhUiJX8suGqkTQaoZ2ne
SGSDGz7aGHKBF1sc7mWZCj435FMza8JY3UP6S0q7GO6MpoKzOZ4DjOjKeRPwBa7n
m22MZZQQ2f4HpvY0hXvrgU7y+e3fhrybSnZFX6D+oCp6o/q0VjTGFQWAoVttG7vV
oJKU4X8w8E403kK/obNRIweEtHvxfL77q67HZHNTMZGvLewXDO1pGalWdyGjqDQ=
=zwS+
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list