How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

Robert J. Hansen rjh at sixdemonbag.org
Fri Nov 21 15:47:35 CET 2014


> I know some encryption schemes reveal more information about the keys
>  used when an attacker has both the plaintext and the ciphertext.  In
>  general, how much information does GPG reveal in such situations?

Virtually none.

> How much plaintext/ciphertext matched data would an attacker need (An
>  order of magnitude is fine) before being able to reverse enough of
> the key to be meaningful on fairly modern computers?

Enough to make it far, *far* more cost-effective to resort to other
methods to recover your key.  Just buying the hard drives alone would
exhaust the budgets of large corporations.



More information about the Gnupg-users mailing list