> This a rather naive question, but I haven't found and answer to it. When
> doing symmetric encryption with AES256, is there any reason to have a
> passphrase that exceeds 32 characters (since that's the length of the
> AES key)?
Yes.
English has about 1.5 bits of entropy per symbol. A 32-chara
> How long a passphrase is recommended for generating a 32 byte (AES) key?
Depends on how you generate it and how much entropy you want.
For my high-security passphrases I grab 16 bytes (128 bits) from
/dev/urandom and base64-encode it. Works great for me and provides an
excellent security margi
You'd want a key derivative function that produce an output of 32
bytes to use as the actual AES key. But you are indeed correct in the
point that what matter is the amount of entropy provided by the
passphrase.
How long a passphrase is recommended for generating a 32 byte (AES) key?
I'll pro
On 04/03/2014 12:06 PM, Tim Prepscius wrote:
Greetings,
So as I said before, I'm working on a pgp base web mail app:
https://github.com/timprepscius/mv
I am having problems validating the signature of a small percentage of
test cases. However GPG with apple-mail says the signatures checkout,
s
On Thursday 03 April 2014 15:06:57 Tim Prepscius wrote:
> Greetings,
>
> So as I said before, I'm working on a pgp base web mail app:
> https://github.com/timprepscius/mv
>
> I am having problems validating the signature of a small percentage of
> test cases. However GPG with apple-mail says the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/03/2014 11:27 PM, Sam Gleske wrote:
> You're making the assumption that 32 ASCII characters can produce
> every possible binary combination in 256 bits. I don't know how
> AES handles password phrases longer than 32 bytes but the key can
> be
You're making the assumption that 32 ASCII characters can produce every
possible binary combination in 256 bits. I don't know how AES handles
password phrases longer than 32 bytes but the key can be stronger I'd
imagine with more random data as the key. I'm simply presuming.
On Thu, Apr 3, 2014
This a rather naive question, but I haven't found and answer to it. When
doing symmetric encryption with AES256, is there any reason to have a
passphrase that exceeds 32 characters (since that's the length of the
AES key)?
thanks
___
Gnupg-users mai
Greetings,
So as I said before, I'm working on a pgp base web mail app:
https://github.com/timprepscius/mv
I am having problems validating the signature of a small percentage of
test cases. However GPG with apple-mail says the signatures checkout,
soo... I'm obviously doing something incorrectly
On Wed, Apr 2, 2014 at 3:14 PM, Leo Gaspard wrote:
> Were you to use the key both for gnupg and other systems, I would
> understand,
> but doing things this way...?
>
I think generally it would be bad practice either way. A compromised
server happens more often than a compromised gpg key. Ther
Hello,
I bought a Chipdrive SPR 532 (aka Pinpad Pro) to read and write my PGP
RSA Keys on the OpenPGP smartcard V2. The reader is connected to a PC
running Ubuntu Linux 13.10. I passed all that gpg-agent vs.
gnome-keyring manager stuff successfully.
The problem is that I cannot authenticate an SS
11 matches
Mail list logo