How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

Schlacta, Christ aarcane at
Fri Nov 21 10:57:06 CET 2014

I know some encryption schemes reveal more information about the keys used
when an attacker has both the plaintext and the ciphertext.  In general,
how much information does GPG reveal in such situations?
How much plaintext/ciphertext matched data would an attacker need (An order
of magnitude is fine) before being able to reverse enough of the key to be
meaningful on fairly modern computers?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20141121/4d11d28c/attachment.html>

More information about the Gnupg-users mailing list