-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote: > > Brute force... trying every possible key on a message until the > Brute force both in the key length and the size of the alphabet.
> > decrypted message makes sense. Since in theory the corrupted message > could be the result of encrypting the message with a different key, > brute force may yield a different key, but in theory, this added > encryption does not add any security. > I wouldn't agree with this reasoning. If a single character is changed, this might correspond to encryption with a different key. But all the other blocks are still encrypted with the _same_ key. Brute-forcing the key of the corrupted block won't help in decrypting the rest of the message. Then again, I might be wrong :) Best regards, Zeljko. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEjUcKFtofFpCIfhMRA+ZEAJwJBduW0byyJLW7FN+6GGJ/i5aybQCeO7b0 oVy2wol3sYgR6GFrtBrdQOQ= =0QCO -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users