cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

David Tomaschik david at systemoverlord.com
Fri Jan 31 16:42:48 CET 2014


Assuming you're talking about encryption algorithms used by GnuPG, the
answer is "no, these algorithms do not have publicly known known-plaintext
attacks."  Messages encrypted with GnuPG are always symmetrically encrypted
-- when using keys, it just encrypts the random file key using RSA/DSA to
allow the recipient to decrypt the message.


On Thu, Jan 30, 2014 at 1:15 PM, Donald Morgan Jr. <donaldmorganjr at gmail.com
> wrote:

> If you know a user has a signature that they use to always end a message
> with, does that data aid in the decryption of the file? Would this exploit
> be applicable to symmetric encryption methods as well?
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>


-- 
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
david at systemoverlord.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20140131/b5dce1d9/attachment.html>


More information about the Gnupg-users mailing list