Re: Changing preferences

2008-09-29 Thread Bill Royds
On 25-Sep-08, at 01:32 , Robert J. Hansen wrote: It should be noted the MitM requires more memory than exists in the world, with more chosen plaintexts than have ever been encrypted with DES. If you're assuming the attacker has literally global computational resources and can make you send

Re: Changing preferences

2008-09-25 Thread Bill Royds
On 25-Sep-08, at 01:32 , Robert J. Hansen wrote: It should be noted the MitM requires more memory than exists in the world, with more chosen plaintexts than have ever been encrypted with DES. If you're assuming the attacker has literally global computational resources and can make you send

Re: Changing preferences

2008-09-24 Thread Bill Royds
On 24-Sep-08, at 07:33 , Faramir wrote: Robert J. Hansen escribió: Faramir wrote: Ok, let me say something on my behalf: in my experience, when something does't work as well as expected, and people say "well... lets do it 2 times, that should work", usually that leads to something that works,

Re: Made of awesome

2008-09-20 Thread Bill Royds
On 20-Sep-08, at 02:39 , Matt wrote: It does sound interesting, but how can I trust the signature of a key I know wasn't generated by the appropriate user? How can anyone trust the key the listserv generated for me? How can I be certain that at no point in the future the serve isn't goi

Re: Someone has harvested my address

2008-09-07 Thread Bill Royds
On 7-Sep-08, at 05:50 , Phil Reynolds wrote: It seems that somebody has harvested this address, as I received an off-list spam to it. If you have added that address to a public PGP key server, that will be the reason. spammers have been harvesting key servers within the pgp.net domain fo

Re: public key newer than the signature

2008-08-10 Thread Bill Royds
On 10-Aug-08, at 17:04 , Charly Avital wrote: Command> check uid Philip R. Zimmermann <[EMAIL PROTECTED]> sig! X 61D7341D 2003-09-07 Dave J. (Scoop0901) <[EMAIL PROTECTED]> sig! FAEBD5FC 2000-03-11 [self-signature] At every trustdb check, that key FAEBD5FC comes up with 'gpg

Re: [GnuPG-users] identical files -> non-identical encrypted files

2008-08-05 Thread Bill Royds
On 2-Aug-08, at 13:23 , Ian Zimmerman wrote: Ok, but how does that solve my problem? Even if I encrypt my file with a symmetric cipher I face the same issue - each encrypted copy will be different. Why is not having identical encrypted copies a problem? The key will decrypt each copy to

Re: Starting with gnupg

2008-08-04 Thread Bill Royds
On 4-Aug-08, at 05:54 , Faramir wrote: Wait... it seems I have been very wrong about the subject... does it means I don't need to install certificates to enable sftp? I know this is turning off-topic, so, can you please give some source of info to learn how to make sftp work? I already searche

Re: Am I Missing Something?

2008-06-04 Thread Bill Royds
On 4-Jun-08, at 18:12 , Carlos Williams wrote: I think it may be working now. I tried everything over from scratch on my gmail account and it looks like it found me key. Is there a way to test this with you guys on the list? Your message was signed but your key does not seem to e in any publi

Re: Linux crypto killer apllication

2008-05-15 Thread Bill Royds
On 15-May-08, at 15:48 , David Picón Álvarez wrote: RSA is more flexible. Easier to protect several documents, easier to have shared secrets, etc You don't seem to understand the difference between public key an secret key encryption. RSA is not used to encrypt the document. RSA is used to

Re: how long should a password be?

2008-05-10 Thread Bill Royds
creation of the hash table. So storage of the salt becomes its own security problem. Bill Royds -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.8 (Darwin) Comment: Bill Royds iQIcBAEBAgAGBQJIJclbAAoJEI1SgF3RWQJIrmYP/jvuMNWBvtWfptagHjjyZ6Lo k1u2u9mZ0xTn0dlo9BZoFSvMvS1ZndgdAuKCDwoy9Uv34M1lk

Re: how long should a password be?

2008-05-05 Thread Bill Royds
On 5-May-08, at 03:55 , Wolf Canis wrote: There are infinite possibilities. That's the trick. Not the length of a password is decisive but the quality. The quality of your password decides how much effort is necessary to hack it. Unfortunately that is not true. Since most systems use a s

Re: playing with cryptography...

2008-05-03 Thread Bill Royds
On 3-May-08, at 03:34 , Werner Koch wrote: As usual I have to mention that what you mean is the Web of Trust (WoT) as used by default in PGP and GPG. In contrast to X.509, OpenPGP allows the use of any kind of trust model with its framework. Yes, you are correct. The WoT model was dev

Re: playing with cryptography...

2008-05-02 Thread Bill Royds
hawte certificate reads Signed ([EMAIL PROTECTED]) Bill Royds ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Naming of GnuPG

2008-04-19 Thread Bill Royds
numbers. the present GNUPG 2.x line should be called GNUPG-SMIME y.x While the GNUPG 1.x line should be GNUPG-OpenPGP y.x They are different so they should have different names. Bill Royds ___ Gnupg-users mailing list Gnupg-users@gnupg.org http