Re: Corrupting files

2006-06-12 Thread Ingo Klöcker
On Monday 12 June 2006 22:15, Tom Thekathyil wrote: > Hi Robert, > > Thanks for your response: that was for a trivial case :) > > Now let's try a curveball. We substitute lines 9 to 12 for the > equivalent _somewhere else_ in the code, so it won't be a simple > transform. This is based on a rule

Re: Corrupting files

2006-06-12 Thread Tom Thekathyil
Hi Robert, Thanks for your response: that was for a trivial case :) Now let's try a curveball. We substitute lines 9 to 12 for the equivalent _somewhere else_ in the code, so it won't be a simple transform. This is based on a rule that a message sent on the 12th day of June would have certain p

Re: Corrupting files

2006-06-12 Thread utternoncesense
If your modus operandi includes exchanging secret information outside of normal channels (e.g., "change the case of the nth letter") you would be better off exchanging more secure information than a single change like that. For example - a second set of public keys. Encyrpt your document twice,

Re: Exporting keys as seperate files

2006-06-12 Thread Janusz A. Urbanowicz
On Sun, Jun 11, 2006 at 07:48:25PM +0300, Oskar L. wrote: > Hello, > > I'd like to export all public keys in my keyring to seperate ASCII-armored > files, using the name from the user ID as the filname, and adding ".asc" > as the extension. If a key has multiple user IDs, then the name from the >

Re: Corrupting files

2006-06-12 Thread zvrba
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote: > > Brute force... trying every possible key on a message until the > Brute force both in the key length and the size of the alphabet. > > decrypted message makes sense. Since in theory

Re: Corrupting files

2006-06-12 Thread Ingo Klöcker
Am Montag, 12. Juni 2006 04:42 schrieb Tom Thekathyil: > A wishes to send message to B. > > A encrypts message using B's key. Opens encrypted message and > corrupts the file by altering one or more characters/adding redundant > lines of code, e.g. changes case of first occurrence of 'T' in the > co

GnuPG modules

2006-06-12 Thread mkontakt
Dear all, I have found a very nice picture of project Agypten(I am missing gnupg). This made me thing about gnupg modular approach. So, I would like to ask you for revision of my thoughts. Gnupg is a modular application composed of a crypto module based on libcrypt(independent development), a comp

Re: Corrupting files

2006-06-12 Thread Remco Post
Tom Thekathyil wrote: > A wishes to send message to B. > In theory, any encrypted message is like completely random. > Question: Is there in theory any way of breaking the corrupted > encryption through brute force? > Brute force... trying every possible key on a message until the decrypted me

Re: Corrupting files

2006-06-12 Thread Atom Smasher
On Mon, 12 Jun 2006, Tom Thekathyil wrote: A wishes to send message to B. A encrypts message using B's key. Opens encrypted message and corrupts the file by altering one or more characters/adding redundant lines of code, e.g. changes case of first occurrence of 'T' in the code. Saves file an