On Fri, Jul 27, 2012 at 08:45:51PM +0200 Also sprach Richard Höchenberger:
> On 27/7/2012 20:12, Kevin Kammer wrote:
> > It has been so long since I had to mess with it (on my mac anyway) that
> > I don't remember. Which libraries do you mean?
>
> I never had to install any additional libraries,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/25/2012 12:04 PM, Werner Koch wrote:
> On Tue, 24 Jul 2012 22:04, jer...@budts.be said:
>
>> apparently they didn't work. Now I completely disabled 'Launch
>> GNOME services on startup' in XFCE so gnome-keyring is not
>> started anymore. Now I
On Jul 29, 2012, at 9:29 AM, Johan Wevers wrote:
> On 29-07-2012 6:48, David Shaw wrote:
>
>> To combat this, OpenPGP has two "quick check" bytes in the encrypted data
>> packet.
>> Basically, they're a repetition of two random bytes from earlier in
> the message.
>
> Does this not lead to a po
On 7/29/2012 9:29 AM, Johan Wevers wrote:
> Does this not lead to a possible known-plaintext attack on gpg?
At risk of seeming condescending --
There is no such thing as a known-plaintext attack on GnuPG. There are
only known-plaintext attacks against the algorithms in GnuPG.
Since there are no
On 29-07-2012 6:48, David Shaw wrote:
> To combat this, OpenPGP has two "quick check" bytes in the encrypted data
> packet.
> Basically, they're a repetition of two random bytes from earlier in
the message.
Does this not lead to a possible known-plaintext attack on gpg?
--
ir. J.C.A. Wevers
PG
>> Hi,
>> I have a symmetrically encrypted pgp file here:
>> http://16s.us/word_machine/downloads/pgp-easy.tgz.pgp
>> gpg will accept the three characters !=X as the password and exit with
a return status of 0 (although it does not actually decrypt the file):
>> $ gpg -d pgp-easy.tgz.pgp gpg: CAST5