The fact that you can't use the plain text and the cipher text to recover the 
private key is simply AMAZING. You really should mention that fact in the faq.

>> Is it polite to post saying that you want to sign keys with somebody 
>> on a random mailing list?
>
> Depends a lot on the mailing list.  I wish I could give clearer advice
> than that.

Ok, how about this one?
I also fequent the nano and curl mailing lists.

>> Is there a limit practical or imposed on the lenght of a passpharse?
>>  I'm thinking of a 740 char passphrase that, though containing 
>> sentences and, therefore, making sense, (though perhaps only to some 
>> sick people like me,) and also containing repetitions of words 4+ 
>> chars long, is really easy for me to remember. Do you think that it 
>> would be a good passphrase?
>
> No.
>
> English has about 1.5 bits of entropy per glyph.  Past about 384 letters
> you're not making things any harder to guess.  Long passphrases also
> silently encourage users to do risky things like cut-and-paste them.
> (It's very easy for malware to look at the contents of your clipboard
> buffer.)

So, what you are saying is that past 384 chars, a longer passpharse ceases to 
be worth the effort?
Did your figuring take into accout the fact that I'm using puntuation marks too 
(max 68+26*2 chars of entropy?)

Another worthwile Q, do people audit the gnupg source code for bugs? If so how 
often? (I'm thinking as I write this of an idiotic but in the openssl package. 
(The C in C is soft for S as in SANITIZE, not like K for KILL yourself.)) Yes, 
I could audit the source, but not for logical errors as I would not understand 
the algorithms involved.



_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to