On Tue, Feb 07, 2006 at 08:14:29PM +0100, Ludwig H?gelsch?fer wrote:
> Hi,
>
> On 07.02.2006 20:05 Uhr, Oskar L. wrote:
>
> > This is of course only true if the attacker knows it is exactly 15
> > characters long. If not, then it should be calculated like this: 95^1 +
> > 95^2 + 95^3 + ... + 95^1
On Tuesday 07 February 2006 1:11 pm, Holger Schuettel wrote:
> Hi
> i've many keys from a keysigning-party in my extra pubring. and now
> i'll sign the complete keyring. it's possible ?
There are keysigning tools that can do this - in association with something
like gpg-agent that caches your pas
Hi,
On 07.02.2006 20:05 Uhr, Oskar L. wrote:
> This is of course only true if the attacker knows it is exactly 15
> characters long. If not, then it should be calculated like this: 95^1 +
> 95^2 + 95^3 + ... + 95^15.
Right, this gives exactly 95^16 - 1. This is not a dramatic improvement
compare
"Gabriele Alberti" <[EMAIL PROTECTED]> wrote:
> Keeping in mind my password can be composed with all 95 writeable ascii
> chars,
> using for example a 15 chars password gives me a "password space" of
> 95^15,
> that is 463291230159753366058349609375 passwords..*much* smaller than the
> 256
> bit
(I know. We already have lots of threads about the net on password length).
Heres my two cents, from someone who has zero security/cryptographic
background (:
Bruteforcing 256bit keys is on a level of hardness that pretty much
renders it impossible.
So I wouldn't really bother trying to make a p
On Thu, 19 Jan 2006 16:14:59 +1300, Paul Blacquiere said:
> Attempting to cross compile libgcrypt results in an error in build cipher in
> the
> test directory,
You should tell us a little bit more what you are trying to do.
> Hacking the Makefile and adding -lpgp-error and -Lwhere_ever_you_hav
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
i've many keys from a keysigning-party in my extra pubring. and now
i'll sign the complete keyring. it's possible ?
thanks for help
please forget my horrible english :-D
- --
Hello,
I am not a crypto expert; i have this paranoia since some time though..
If i use _symmetric_ cyphers (lets say a 256 bit) how long my password has to
be?
Keeping in mind my password can be composed with all 95 writeable ascii chars,
using for example a 15 chars password gives me a "passwor
* enediel gonzalez <[EMAIL PROTECTED]> [060206 16:57]:
> #!/bin/bash
> cd /tmp/backup && /bin/echo apassword | /usr/bin/gpg -se --passphrase-fd 0
> --logger-fd 1 -r [EMAIL PROTECTED] /tmp/backup/backup20060206100521 >>
> /tmp/debug3.txt
> Executing it from a cron task I obtained in /tmp/debug3.