<div dir="ltr"><div dir="ltr">On Fri, Jul 26, 2019 at 6:20 PM Ángel <<a href="mailto:angel@pgp.16bits.net">angel@pgp.16bits.net</a>> wrote:<br></div><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On 2019-07-25 at 16:59 -0400, Kynn Jones via Gnupg-users wrote:<br>
> In other words, I would love to use a single-purpose tool that is to<br>
> AES256-encryption/decryption what, for example, gzip is to<br>
> compression/decompression.<br>
> <br>
> Unfortunately, I have not been able to hit upon such a tool, which I<br>
> find a bit mystifying. Instead, all the tools I have found fall into<br>
> two distinct categories: (1) ephemeral projects; (2) large systems<br>
> (like GnuPG or OpenSSL) in which the AES256-encryption/decryption<br>
> capability is such tiny subcomponent that it is very difficult for me<br>
> to find out what I need to do for my purposes.<br>
<br>
A single-purpose tool that only did AES265-encryption would be finished,<br>
needing little to no mainteinance and thus looking like an ephemeral<br>
project.<br></blockquote><div><br></div><div>I see, good point.<br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I think the main risk you would bear using a little-test tool would be<br>
that it was somehow flawed in a subtle way so that other tools failed to<br>
decrypt a tiny fraction of the files.<br></blockquote><div><br></div>Thank you for the heads-up. I had not considered this risk at all<br>until now. I wonder if I can find a good set of test cases, maybe by<br>cannibalizing the test suites of other programs.<br> <blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
I recommend you to also keep hashes of the original files (maybe in a<br>
different encrypted file) in addition to whatever authentication system<br>
you plan to be using. Plus, obviously, keeping a copy of the encryption<br>
tool (both compiled and in source form) along the backups.<br>
<br>
As for the actual format to use, I would suggest using zip files with<br>
AES encryption. There are many programs supporting it, and it is<br>
nowadays an ubiquitousformat (albeit AES encryption support is lower,<br>
that is still much bigger than for eg. an openssl enc format). It seems<br>
likely that there will still be programs able to decrypt them, even if<br>
the original program no longer works.<br>
<br>
Nevertheless, with a goal like this, you should include a plan wherein<br>
there are periodic tests of the data, in which a goal can be to detect<br>
that it is no longer possible to decrypt them with commonplace hardware,<br>
and perform a migration to a more modern (and supported) encryption<br>
schema if actually needed.<br></blockquote><div><br></div><div>All very sensible advice. Thank you!</div><div><br></div><div>kj</div><div><br></div></div></div>