On composing scrypt and openpgp s2k key stretching for symmetric encryption

Brian Gitonga Marete marete at toshnix.com
Thu May 22 15:46:03 CEST 2014


Hello all!

What would be the security effect of generating a 32 byte key from a
passphrase using scrypt and then using that as a "passphrase" for openpgp's
symmetric encryption (this 32 byte key will of course then be acted upon by
openpgp's s2k algorithm). Specifically, can one expect that this will make
brute-forcing a symmetric passphrase (theoretically or practically) harder?
(Given the same strong passhrase).

Please note that I am asking this from an application point of view and not
calling for the inclusion of scrypt into the openpgp standard.

Thanks!

Brian Gitonga Marete,
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20140522/f595ae27/attachment.html>


More information about the Gnupg-users mailing list