Re: Is Open PGP or GnuPG or GPG possible on a Mac?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It should be possible but it might require high technical skills in the operation of a search engine of your choice. Lets try your topic: https://startpage.com/do/search?q=Is+Open+PGP+or+GnuPG+or+GPG+possible+on+a+Mac Looks like some usable answers turn up. But lets try something shorter and more specific: https://startpage.com/do/search?q=gnupg+on+mac Looks also good. Maybe we can see if people asked about this on the mailing list before? Lets try: https://www.google.de/search?&q=gnupg%20on%20mac%20site%3Agnupg.org&ie=iso-8859-1&q=mac+installer++site:lists.gnupg.org%2Fpipermail%2Fgnupg-users%2F2014 Looks also interesting for 2014. Maybe there will also be some results for 2015? Hope that gets you somewhere. Greetings Martin -BEGIN PGP SIGNATURE- Version: GnuPG v1 iEYEARECAAYFAlVDKJYACgkQ/6vdZgk46siVKQCfQy5CoANLrJiK5dSpoS75DG9X 5FcAnROfi88h0UYDQ0L4ZMYWSLYiWe5N =O6Pn -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
How to get my GNUPG Elgamal private key exponent?
Hi, I have tried googling around. The closest solution I get is: private.key contains the private key file. $pgpdump -i private.key But this only gives me the following: ElGamal p ElGamal g ElGamal y Encrypted Elgamal x some other information of crypto It shows the value for p,g,y, but not x. How can I find out the value of x? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Is Open PGP or GnuPG or GPG possible on a Mac?
On Thursday 30 April 2015 23:47:42 Mercury Rising wrote: > I will take the answer on the list and at mercuryrisin...@gmail.com. I Up > graded to Mavericks on the Mac. I am looking for a whole package of open > source PGP-like programs that will let me encrypt to other keys and manage > other keys and my own. It is for private corrispondence. I was sending > messages from my iPhone to the list but don't see them posted. Perhaps > directly form my Mac will help this time. Yes, it is possible to use OpenPGP with GnuPG on OS X: https://ssd.eff.org/en/module/how-use-pgp-mac-os-x The best (most stable, best supported, easiest overall) results tend to involve: GPG Suite: https://gpgtools.org/ Mozilla Thunderbird: https://www.mozilla.org/en-US/thunderbird/ Enigmail: https://www.enigmail.net/home/index.php Keep in mind that the parties you want to communicate with also have to understand how to handle OpenPGP. If it matters to you to be more secure in communication, I would strongly suggest making sure your computer is using full disk encryption. In the case of OS X on a Mac, this means enabling FileVault. Samir signature.asc Description: This is a digitally signed message part. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How to get my GNUPG Elgamal private key exponent?
On Fri 2015-05-01 02:37:03 -0400, Danny Crane wrote: > I have tried googling around. The closest solution I get is: > > private.key contains the private key file. > > $pgpdump -i private.key > > But this only gives me the following: > > ElGamal p > ElGamal g > ElGamal y > Encrypted Elgamal x > some other information of crypto > > It shows the value for p,g,y, but not x. How can I find out the value of x? pgpdump shows that x is encrypted. pgpdump isn't capable of decrypting it. If you remove the passphrase from your secret key, you should be able to produce a file that pgpdump can parse for you. however, note that this places your secret key material is a very exposed place -- anyone who gets that file can trivially compromise your key. Since el gamal keys are usually subkeys, you might try *only* exporting the subkey without a passphrase, so that at least you do not expose the secret key material for your primary key. Using gpg 1.4.x or 2.0.x, that should be possible with: gpg --export-options export-reset-subkey-passwd --export-secret-subkeys ${SUBKEYID}\! | pgpdump yes, that is a literal ! at the end. so if your subkey ID is 0x1234567890abcdef, then you would run: gpg --export-options export-reset-subkey-passwd --export-secret-subkeys 0x1234567890abcdef\! | pgpdump hth, --dkg ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How to get my GNUPG Elgamal private key exponent?
Thank you. Really helps! On May 1, 2015 6:57 AM, "Daniel Kahn Gillmor" wrote: > On Fri 2015-05-01 02:37:03 -0400, Danny Crane wrote: > > > I have tried googling around. The closest solution I get is: > > > > private.key contains the private key file. > > > > $pgpdump -i private.key > > > > But this only gives me the following: > > > > ElGamal p > > ElGamal g > > ElGamal y > > Encrypted Elgamal x > > some other information of crypto > > > > It shows the value for p,g,y, but not x. How can I find out the value of > x? > > > pgpdump shows that x is encrypted. pgpdump isn't capable of decrypting > it. > > If you remove the passphrase from your secret key, you should be able to > produce a file that pgpdump can parse for you. > > however, note that this places your secret key material is a very > exposed place -- anyone who gets that file can trivially compromise your > key. > > Since el gamal keys are usually subkeys, you might try *only* exporting > the subkey without a passphrase, so that at least you do not expose the > secret key material for your primary key. > > Using gpg 1.4.x or 2.0.x, that should be possible with: > > > gpg --export-options export-reset-subkey-passwd --export-secret-subkeys > ${SUBKEYID}\! | pgpdump > > yes, that is a literal ! at the end. so if your subkey ID is > 0x1234567890abcdef, then you would run: > > gpg --export-options export-reset-subkey-passwd --export-secret-subkeys > 0x1234567890abcdef\! | pgpdump > > hth, > > --dkg > ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Multiple Smartcards - Signing
On Thu 2015-04-30 17:49:28 -0400, Matthew Monaco wrote: > Why isn't gpg smarter about selecting only from the /available/ keys > at the time of signing? BTW, I'm using 2.1.3 I think this is the crux of your issue. It sounds like a bug to me. I've opened a bug report about it: https://bugs.gnupg.org/gnupg/issue1967 hth, --dkg ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: excessive usage of /dev/random?
> One assertion (from Robert J. Hansen) implies that a "high school > math overview of large number theory" suggests that it may well be > reasonable to require 2400 bits of entropy to generate a 2048-bit RSA > key. And unreasonable, too. I specifically said that I couldn't use it to argue one side or another, but rather it illuminated the uncertainty of both sides. A capsule summary is below. > The other assertion (From Peter Gutmann) says that it's not > necessary (with a sarcastic allusion to "numerology")... I concur with Peter's assessment that it's numerology. :) > 1) key generation routines for these problems need an unpredictable > source of entropy with which to search the space of possible values > to produce a proper secret key. A 2048-bit number as used in RSA has ~2028 shannons of uncertainty (due to not every number being prime). To sort through 2028 shannons of uncertainty using the general number field sieve requires approximately 2^112 work. (*Approximately*.) So I see an enormous disconnect between the uncertainty of the prime and the work factor that goes into breaking the key. We talk about how a key has so many shannons of entropy, but the reality is different: it has so much equivalent work factor. If we reduce the uncertainty of the prime to a "mere" 112 shannons, will that affect the work factor for the GNFS? I don't know, and I don't trust my sense of large number theory enough to even have a good guess. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users