> I have a program that will frequently need to store modest-size
> chunks of of data on disk, perhaps 1-4kB per chunk.  The data is
> sensitive, but not ultra top secret.  I would like to make a
> reasonable effort to keep it from prying eyes.

Please don't take this the wrong way, but -- please don't.  Libgcrypt is
not particularly friendly to novices.  It exposes a *lot* of dials and
switches in the interests of letting experts do weird and useful things.
 Novices will be better-suited with something like Peter Gutmann's
cryptlib, which is high-quality and well-regarded and is probably more
newbie-friendly.

> P.S.  On my FreeBSD system, un-updated as it may be, there seems
> to be a crypt(3) in the standard C library.

I believe on FreeBSD this is just bog-standard DES, but I could be
mistaken.  DES is not a strong cipher.

> Fortunately, I *do* have something that's a bit faster than A Pentium 166
> :-) but I'm still rather baffled by the meaning of the phrase "designed
> to be time-consuming" in this context.

To help foil brute-force attacks.  crypt(3) is normally used with really
short pieces of text -- passwords.  As such, one way to attack passwords
is to get a large dictionary of words and run each word through crypt(3)
and store the result.  If you want to break a password, look at its
crypt(3)ed value and compare it to your database of computed values.  If
you get a hit, then look back at what the original word was.

To foil these sorts of attacks ("dictionary attacks"), crypt(3) has been
built to be very, very slow.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to