On Tue, Mar 11, 2025 at 09:09:08AM +0100, Bernhard Reiter via Gnupg-users wrote:
[...]
> Quantum-safe cryptography – fundamentals, current developments and
> recommendations, BSI
> from 18.05.2022
> https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Brochure/quantum-safe-cryptograph
On Fri, Oct 04, 2024 at 10:35:02AM -0400, Robert J. Hansen via Gnupg-users
wrote:
> > A nation state with the ability to crack 1024 bit RSA would not spend
> > years and billions of dollars on the messages/files of a single
> > entity.
>
> They absolutely would, in a heartbeat, and they'd conside
On Fri, Oct 04, 2024 at 03:47:50AM -0400, Robert J. Hansen via Gnupg-users
wrote:
> > to skip PGP-2 keys in existing keyrings. And of course the PGP-2
> > encryption has not been broken - only signatures are vulnerable to the
> > full MD5 hash algorithm attacks we know for 25 years.
>
> Given th
On Thu, Apr 18, 2024 at 01:53:59PM +0200, Werner Koch via Gnupg-users wrote:
> On Wed, 17 Apr 2024 16:43, Christian Sommer said:
>
> > I indeed choose to preset the "with-fingerprint" option in my
> > gpg.conf. By removing it, listing my keys give back the full 64
> > character long fingerprint of
On Wed, Mar 06, 2024 at 09:43:00AM +0100, Werner Koch wrote:
> On Tue, 5 Mar 2024 11:15, Bruce Walzer said:
>
> > So just to be clear, I am not complaining that GnuPG implemented the
> > LibrePGP version of OCB. I am complaining that GnuPGP did #2 and #3
> > before imp
It seems to me that there are at least 3 decisions to make when
considering the implementation a new block cipher mode:
1. If your implementation will receive the block mode. Receiving a
block mode does not cause an interoperability problem. If anything,
this improves interoperability.
2. I
On Mon, Mar 04, 2024 at 12:03:41PM +0100, Tobias Leupold via Gnupg-users wrote:
[...]
> After some research, I found
>
> https://github.com/open-keychain/open-keychain/issues/2886 ,
>
> describing this exact issue.
That would be the cipher block mode proliferation issue.
> As a possible fix
On Sat, Feb 03, 2024 at 11:35:20PM +0900, witchy via Gnupg-users wrote:
[...]
> I noticed that the npth signature data has expired.
Why is anyone signing software with expiring keys anyway? I have
ranted against the practice of PGP key expiry in general[1] but this
seems particularly harmful. GnuP
On Sat, Apr 15, 2023 at 11:17:31AM -0500, Mike Schleif wrote:
> On trying to decrypt a file, we get the subject error on failure.
What version of GnuPG are you using? Running on what platform?
Bruce
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
ht
On Thu, Dec 01, 2022 at 02:45:33PM +0100, Andreas Heinlein via Gnupg-users
wrote:
> Hello,
>
> I am trying to implement WKD/WKS and followed the tutorial here:
> https://wiki.gnupg.org/WKS
>
> I have a few questions:
>
> 1. If I follow the guidelines for creating the directory
> /var/lib/gnupg/
On Sat, Sep 24, 2022 at 11:19:32PM +, Mik J via Gnupg-users wrote:
> Hello,
> My goal is to use the enigma plugin that is part of roundcube webmail.
> I get this error output[18-Sep-2022 00:41:46 +0200]:
[...]
> [18-Sep-2022 00:41:46 +0200]: GPG: ERROR: gpg: Fatal: failed to
> open '/dev/nul
11 matches
Mail list logo