Re: Is Open PGP or GnuPG or GPG possible on a Mac?

2015-05-01 Thread Martin Behrendt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

It should be possible but it might require high technical skills in
the operation of a search engine of your choice.

Lets try your topic:

https://startpage.com/do/search?q=Is+Open+PGP+or+GnuPG+or+GPG+possible+on+a+Mac

Looks like some usable answers turn up. But lets try something shorter
and more specific:

https://startpage.com/do/search?q=gnupg+on+mac

Looks also good. Maybe we can see if people asked about this on the
mailing list before? Lets try:

https://www.google.de/search?&q=gnupg%20on%20mac%20site%3Agnupg.org&ie=iso-8859-1&q=mac+installer++site:lists.gnupg.org%2Fpipermail%2Fgnupg-users%2F2014

Looks also interesting for 2014. Maybe there will also be some results
for 2015? Hope that gets you somewhere.

Greetings
Martin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlVDKJYACgkQ/6vdZgk46siVKQCfQy5CoANLrJiK5dSpoS75DG9X
5FcAnROfi88h0UYDQ0L4ZMYWSLYiWe5N
=O6Pn
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


How to get my GNUPG Elgamal private key exponent?

2015-05-01 Thread Danny Crane
Hi,

I have tried googling around. The closest solution I get is:

private.key contains the private key file.

$pgpdump -i private.key

But this only gives me the following:

ElGamal p
ElGamal g
ElGamal y
Encrypted Elgamal x
some other information of crypto

It shows the value for p,g,y, but not x. How can I find out the value of x?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is Open PGP or GnuPG or GPG possible on a Mac?

2015-05-01 Thread Samir Nassar
On Thursday 30 April 2015 23:47:42 Mercury Rising wrote:
> I will take the answer on the list and at mercuryrisin...@gmail.com.  I Up
> graded to Mavericks on the Mac. I am looking for a whole package of open
> source PGP-like programs that will let me encrypt to other keys and manage
> other keys and my own. It is for private corrispondence. I was sending
> messages from my iPhone to the list but don't see them posted. Perhaps
> directly form my Mac will help this time.

Yes, it is possible to use OpenPGP with GnuPG on OS X:

https://ssd.eff.org/en/module/how-use-pgp-mac-os-x

The best (most stable, best supported, easiest overall) results tend to 
involve:

GPG Suite: https://gpgtools.org/
Mozilla Thunderbird: https://www.mozilla.org/en-US/thunderbird/
Enigmail: https://www.enigmail.net/home/index.php

Keep in mind that the parties you want to communicate with also have to 
understand how to handle OpenPGP.

If it matters to you to be more secure in communication, I would strongly 
suggest making sure your computer is using full disk encryption. In the case 
of OS X on a Mac, this means enabling FileVault.

Samir


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to get my GNUPG Elgamal private key exponent?

2015-05-01 Thread Daniel Kahn Gillmor
On Fri 2015-05-01 02:37:03 -0400, Danny Crane wrote:

> I have tried googling around. The closest solution I get is:
>
> private.key contains the private key file.
>
> $pgpdump -i private.key
>
> But this only gives me the following:
>
> ElGamal p
> ElGamal g
> ElGamal y
> Encrypted Elgamal x
> some other information of crypto
>
> It shows the value for p,g,y, but not x. How can I find out the value of x?


pgpdump shows that x is encrypted.  pgpdump isn't capable of decrypting
it.

If you remove the passphrase from your secret key, you should be able to
produce a file that pgpdump can parse for you.

however, note that this places your secret key material is a very
exposed place -- anyone who gets that file can trivially compromise your
key.

Since el gamal keys are usually subkeys, you might try *only* exporting
the subkey without a passphrase, so that at least you do not expose the
secret key material for your primary key.

Using gpg 1.4.x or 2.0.x, that should be possible with:


gpg --export-options export-reset-subkey-passwd --export-secret-subkeys 
${SUBKEYID}\! | pgpdump

yes, that is a literal ! at the end.  so if your subkey ID is
0x1234567890abcdef, then you would run:

gpg --export-options export-reset-subkey-passwd --export-secret-subkeys 
0x1234567890abcdef\! | pgpdump

hth,

--dkg

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to get my GNUPG Elgamal private key exponent?

2015-05-01 Thread Danny Crane
Thank you. Really helps!
On May 1, 2015 6:57 AM, "Daniel Kahn Gillmor"  wrote:

> On Fri 2015-05-01 02:37:03 -0400, Danny Crane wrote:
>
> > I have tried googling around. The closest solution I get is:
> >
> > private.key contains the private key file.
> >
> > $pgpdump -i private.key
> >
> > But this only gives me the following:
> >
> > ElGamal p
> > ElGamal g
> > ElGamal y
> > Encrypted Elgamal x
> > some other information of crypto
> >
> > It shows the value for p,g,y, but not x. How can I find out the value of
> x?
>
>
> pgpdump shows that x is encrypted.  pgpdump isn't capable of decrypting
> it.
>
> If you remove the passphrase from your secret key, you should be able to
> produce a file that pgpdump can parse for you.
>
> however, note that this places your secret key material is a very
> exposed place -- anyone who gets that file can trivially compromise your
> key.
>
> Since el gamal keys are usually subkeys, you might try *only* exporting
> the subkey without a passphrase, so that at least you do not expose the
> secret key material for your primary key.
>
> Using gpg 1.4.x or 2.0.x, that should be possible with:
>
>
> gpg --export-options export-reset-subkey-passwd --export-secret-subkeys
> ${SUBKEYID}\! | pgpdump
>
> yes, that is a literal ! at the end.  so if your subkey ID is
> 0x1234567890abcdef, then you would run:
>
> gpg --export-options export-reset-subkey-passwd --export-secret-subkeys
> 0x1234567890abcdef\! | pgpdump
>
> hth,
>
> --dkg
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Multiple Smartcards - Signing

2015-05-01 Thread Daniel Kahn Gillmor
On Thu 2015-04-30 17:49:28 -0400, Matthew Monaco wrote:
> Why isn't gpg smarter about selecting only from the /available/ keys
> at the time of signing? BTW, I'm using 2.1.3

I think this is the crux of your issue.  It sounds like a bug to me.

I've opened a bug report about it:

 https://bugs.gnupg.org/gnupg/issue1967

hth,

--dkg

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: excessive usage of /dev/random?

2015-05-01 Thread Robert J. Hansen
> One assertion (from Robert J. Hansen) implies that a "high school
> math overview of large number theory" suggests that it may well be
> reasonable to require 2400 bits of entropy to generate a 2048-bit RSA
> key.

And unreasonable, too.  I specifically said that I couldn't use it to
argue one side or another, but rather it illuminated the uncertainty of
both sides.  A capsule summary is below.

> The other assertion (From Peter Gutmann) says that it's not
> necessary (with a sarcastic allusion to "numerology")...

I concur with Peter's assessment that it's numerology.  :)

> 1) key generation routines for these problems need an unpredictable 
> source of entropy with which to search the space of possible values 
> to produce a proper secret key.

A 2048-bit number as used in RSA has ~2028 shannons of uncertainty (due
to not every number being prime).  To sort through 2028 shannons of
uncertainty using the general number field sieve requires approximately
2^112 work.  (*Approximately*.)  So I see an enormous disconnect between
the uncertainty of the prime and the work factor that goes into breaking
the key.

We talk about how a key has so many shannons of entropy, but the reality
is different: it has so much equivalent work factor.  If we reduce the
uncertainty of the prime to a "mere" 112 shannons, will that affect the
work factor for the GNFS?

I don't know, and I don't trust my sense of large number theory enough
to even have a good guess.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users