Hello,
  My understanding of en-/decryption is that there is no indication of
progress toward finding a successful key match of a given encryption.
Only when the key is exactly correct will the encrypted data be revealed.
  I have seen numerous TV and movie stories where someone is
frantically attempting to decrypt something and there is a progress
meter to indicate the current degree of success. Every time I see this
I think "That is total BS! It is all or nothing."
  Related to this is the oft-repeated request to avoid identifiable
information (initials, birth date, etc.) in a cryptographic key. I
presume this gives an attacker a preferred set of characters to
attempt before moving on to truly random combinations.
  Finally, a brute force attack requires potentially billions of
attempts. Obviously this cannot be done by trying the usual log in
screens or prompts; there are delays between attempts, and a limited
number of attempts per some interval. How does an attacker then
perform a brute force attack? Does he cadge a block of encrypted text
and hammer on that until success?

  Is this a correct interpretation?

-- 
James Moe
moe dot james at sohnen-moe dot com
520.743.3936

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to