cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?
David Tomaschik
david at systemoverlord.com
Fri Jan 31 16:42:48 CET 2014
Assuming you're talking about encryption algorithms used by GnuPG, the
answer is "no, these algorithms do not have publicly known known-plaintext
attacks." Messages encrypted with GnuPG are always symmetrically encrypted
-- when using keys, it just encrypts the random file key using RSA/DSA to
allow the recipient to decrypt the message.
On Thu, Jan 30, 2014 at 1:15 PM, Donald Morgan Jr. <donaldmorganjr at gmail.com
> wrote:
> If you know a user has a signature that they use to always end a message
> with, does that data aid in the decryption of the file? Would this exploit
> be applicable to symmetric encryption methods as well?
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
david at systemoverlord.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20140131/b5dce1d9/attachment.html>
More information about the Gnupg-users
mailing list