On 02/20/2013 08:23 PM, Robert J. Hansen wrote:
> The current best attack on AES-256 maxes out at 11 rounds; the full
> AES-256 has 14 rounds.
Doing a little more research, I found a theoretical attack on the full
-256 and -192; I was wrong to say the current best attack only worked on
a reduced-r
On 02/20/2013 07:11 PM, Laila Vrazda wrote:
> Very well, theoretically AES-256 is less secure than AES-192.
The current best attack on AES-256 maxes out at 11 rounds; the full
AES-256 has 14 rounds. Nobody's ever demonstrated that full AES-256 is
easier to break than AES-192; and even if they had
On 02/20/2013 06:41 PM, Jim Treinen wrote:
> I am new to GPG, specifically GPGME. I am trying to familiarize
> myself with programming against the GPGME C library. I was wondering
> if it is possible to explicitly specify the use of AES 256 and choose
> a block mode when using the OpenPGP protoco
Hello,
I am new to GPG, specifically GPGME. I am trying to familiarize myself
with programming against the GPGME C library. I was wondering if it is
possible to explicitly specify the use of AES 256 and choose a block mode
when using the OpenPGP protocol ? I am sorry if I have overlooked somethi
On 02/20/2013 04:29 PM, Stefan Malte Schumacher wrote:
> I want to create encrypted backups with tar and gpg, which I then want to
> upload to my online storage. Strangely I can't get it working.
> "find /mnt/raid/Dokumente/ -type f -print0 |tar cfzv | gpg --symmetric
> --output 1.tar.gz.gpg"
if y
Hi all,
Wondering if someone can help me out with gpg key forwarding in the same
style that you can do with ssh. This is the best answer I've found so far:
http://superuser.com/questions/161973/how-can-i-forward-a-gpg-key-via-ssh-agent
Wondering if anyone could point me towards a cleaner solouti
On Wed, 20 Feb 2013 06:05, jw72...@verizon.net said:
> Hi, David. I appreciated your prompt reply. So with a concatenated
> keyring in the format "foo.pub" would I first use a command like the
> following one if I want to get the keys out of it in order to move
No, please don't do that! The API