On Monday 12 June 2006 22:15, Tom Thekathyil wrote:
> Hi Robert,
>
> Thanks for your response: that was for a trivial case :)
>
> Now let's try a curveball. We substitute lines 9 to 12 for the
> equivalent _somewhere else_ in the code, so it won't be a simple
> transform. This is based on a rule
Hi Robert,
Thanks for your response: that was for a trivial case :)
Now let's try a curveball. We substitute lines 9 to 12 for the
equivalent _somewhere else_ in the code, so it won't be a simple
transform. This is based on a rule that a message sent on the 12th
day of June would have certain p
If your modus operandi includes exchanging secret information outside
of normal channels (e.g., "change the case of the nth letter") you
would be better off exchanging more secure information than a single
change like that. For example - a second set of public keys. Encyrpt
your document twice,
On Sun, Jun 11, 2006 at 07:48:25PM +0300, Oskar L. wrote:
> Hello,
>
> I'd like to export all public keys in my keyring to seperate ASCII-armored
> files, using the name from the user ID as the filname, and adding ".asc"
> as the extension. If a key has multiple user IDs, then the name from the
>
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Mon, Jun 12, 2006 at 08:36:54AM +0200, Remco Post wrote:
>
> Brute force... trying every possible key on a message until the
>
Brute force both in the key length and the size of the alphabet.
>
> decrypted message makes sense. Since in theory
Am Montag, 12. Juni 2006 04:42 schrieb Tom Thekathyil:
> A wishes to send message to B.
>
> A encrypts message using B's key. Opens encrypted message and
> corrupts the file by altering one or more characters/adding redundant
> lines of code, e.g. changes case of first occurrence of 'T' in the
> co
Dear all,
I have found a very nice picture of project Agypten(I am missing gnupg).
This made me thing about gnupg modular approach. So, I would like to ask
you for revision of my thoughts. Gnupg is a modular application composed
of a crypto module based on libcrypt(independent development), a
comp
Tom Thekathyil wrote:
> A wishes to send message to B.
>
In theory, any encrypted message is like completely random.
> Question: Is there in theory any way of breaking the corrupted
> encryption through brute force?
>
Brute force... trying every possible key on a message until the
decrypted me
On Mon, 12 Jun 2006, Tom Thekathyil wrote:
A wishes to send message to B.
A encrypts message using B's key. Opens encrypted message and corrupts
the file by altering one or more characters/adding redundant lines of
code, e.g. changes case of first occurrence of 'T' in the code. Saves
file an