AES-NI, symmetric key generation

vedaal at nym.hush.com vedaal at nym.hush.com
Tue Mar 10 21:42:51 CET 2015


On 3/10/2015 at 4:19 PM, "Maricel Gregoraschko" <maricelgregoraschko at yahoo.com> wrote:

>I agree, using key instead of passphrase doesn't enhance security 
>(assuming an attacker knows that the key was derived from a 
>passphrase and with what key derivation algorithm? I assume the 
>randomness/entropy of the key itself is high enough regardless of 
>the passphrase strength?). The reason I was asking if it's a 
>possibility to store the symmetric key to decrypt with later, was 
>to protect against future changes in the key derivation algorithm, 
>that would make gpg generate a different key for the same 
>passphrase, useless to decrypt previously encrypted data.Thank you 
>for your support.

-----

If you don't want to keep your passsphrase, and want only to keep the session key,
and you want this to have no weakness because of a questionably strong enough password that was used to generate the key,
then there is an easy way to do what you want:

[1] Encrypt a test message to any of your own keys.

[2] Decrypt this test message, with the option of --show-session-key

[3] Use this session key as the 64 character password for your symmetric encryption, (and save it, or you won't be able to decrypt the symmetric message).

[4] Decrypt your symmetrically encrypted file or message, using the option of --show-session-key

[5] Save this session key, and if you wish, you can destroy the first one. (you can always get it back by decrypting your message of step [1] ).


The string-to-key part of generating the session key for the symmetrically encrypted message, will be using a random 64 character GnuPG generated session key as it's password.

You can't find a better password (especially even one that you don't have to remember ;-)   )


vedaal




More information about the Gnupg-users mailing list