On 04/02/2014 01:07 PM, Tim Chase wrote: > 1) I'd missed that GPG conveniently compresses the data before > encrypting which would explain some of the differences I saw.
[...] > in more than half of my use cases (small plain-text/JSON messages) It sounds to me like you might be setting up some sort of automated encrypted JSON message-passing scheme. If so, you should be aware that if any of the encrypted JSON could be controlled by an attacker, that attacker could possibly learn information about the other parts of the message that are not controlled by them when using compression, just by inspecting the size of the traffic. This is essentially how the CRIME attack against TLS works, but the theoretical framework of the attack itself isn't necessarily limited to TLS. Please make sure you understand the CRIME attack against TLS and your mechanism's use cases well enough to be certain that a comparable attack isn't applicable, or just explicitly turn off compression for your OpenPGP-encrypted data if you can afford the extra bandwidth and are unsure about the use cases to which other people might put your protocol. hth, --dkg
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users