Side-channel attacks

vedaal at nym.hush.com vedaal at nym.hush.com
Tue Jan 18 20:59:33 CET 2022



On 1/18/2022 at 11:26 AM, "Robert J. Hansen via Gnupg-users"  wrote:>
1.4 should be able to decrypt all 2.6 generated data.

Not from the Disastry builds, which extended 2.6 to support newer 
algorithms.

=====
1.4 still can decrypt and verify anything in Disastry's last build. 
He died before he could implement Camellia. 

I have been using it since it came out, and 1.4 can easily decrypt and
verify, but there is a simple procedural issue.:
1.4 decides that when it sees a v3 key, it tries to decrypt Idea and
verify md5. Which works perfectly for 2.6.x.

In order for 1.4 to decrypt and verify messages done with other
encryption algorithms and signing algorithms, the name of the signing
algorithm and the name of the encryption algorithm need to be included
in the command line. 
If this is cumbersome, so just continue to use Disastry 2.6 to decrypt
and verify. 
It's not gnupg's problem. 

Vedaal 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20220118/7cb84644/attachment.html>


More information about the Gnupg-users mailing list