Hi. I use PGP (Pretty Good Privacy) 8.0.2 in Windows XP Home Edition. My
friend uses GnuPG (Gnu Privacy Guard), perhaps still version 1.4.5 and I guess
in Windows XP. After a hard-drive replacement I discovered that I had saved
his GnuPG public key in a .doc file on a Recordable Compact Disc
Yup - you got it.
Symmetric encryption is *way* faster (that's a technical term :-) than
asymmetric.
Hence the slower version is used to exchange a random key that is then used
to handle the encryption/decryption of the data.
Algorithms are implementation dependent but it is common to use 3DES for
Felipe Alvarez schrieb:
> On Thu, Mar 26, 2009 at 8:17 PM, Sven Radde wrote:
>
>> Hi!
>>
>> Felipe Alvarez schrieb:
>>
>>> Someone today shook my understanding of asymmetric ciphers.
>>>
>>> _Bob performs symmetric encryption on message with_
>>> _key "K" (generated randomly). He then encr
On Thu, Mar 26, 2009 at 8:17 PM, Sven Radde wrote:
> Hi!
>
> Felipe Alvarez schrieb:
>> Someone today shook my understanding of asymmetric ciphers.
>>
>> _Bob performs symmetric encryption on message with_
>> _key "K" (generated randomly). He then encrypts "K" _
>> _with Alice's public key, and se
Hi!
Felipe Alvarez schrieb:
> Someone today shook my understanding of asymmetric ciphers.
>
> _Bob performs symmetric encryption on message with_
> _key "K" (generated randomly). He then encrypts "K" _
> _with Alice's public key, and sends both the symetrically _
> _encrypted message and asymmetri
On Thu, Mar 26, 2009 at 07:51:15PM +1000, Felipe Alvarez wrote:
> I was unable to find adequate explanations online.
http://www.gnupg.org/gph/en/manual/x209.html
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44
Yes, that is right.
Asymmetric encryption is a slow process. Encrypting the whole message would
take forever.
So, symmetric keys a quite small, that's why the described technique is
used.
Cheers,
Sascha
-Original Message-
From: gnupg-users-boun...@gnupg.org [mailto:gnupg-users-boun...@gnu
On Thu, Mar 26, 2009 at 07:51:15PM +1000, Felipe Alvarez wrote:
> _Bob performs symmetric encryption on message with_
> _key "K" (generated randomly). He then encrypts "K" _
> _with Alice's public key, and sends both the symetrically _
> _encrypted message and asymmetrically encrypted key to Alice_
The threat mode is concerning the hacking of PC based software.
We want to place a vital part of the processing of data on a unit consisting
of a microcontroller device which we design and build ourselves. It is not
possioble for a hacker to actually intercept the processing done on board
this unit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Someone today shook my understanding of asymmetric ciphers.
_Bob performs symmetric encryption on message with_
_key "K" (generated randomly). He then encrypts "K" _
_with Alice's public key, and sends both the symetrically _
_encrypted message and as
On Tue, Mar 17, 2009 at 12:24 PM, Bo Berglund wrote:
>
...
> The idea is to have the PC program encrypt a fairly large chunk of data using
> the embedded unit's public key and then send the result over the channel into
> the embedded application.
>
> Inside this (protected) hardware the secret k
11 matches
Mail list logo