Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread markus reichelt
* "Ciprian Dorin, Craciun" wrote: > Thank you for the quick reply. (This is the kind of answer I was > hopping to get. :) ) It seems that `s2k-count` escaped me. :) > > Maybe there should be an entry in the FAQ about this topic. Well, other projects make good use of that option, f.e. lo

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key resilience against off-line brute-force attacks" Ciprian: Wath you say is possible but useless. One could build a machine who computes anything in only 1 clock cycle or than not

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
On Sun, Nov 29, 2009 at 12:29 AM, Mario Castelán Castro wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key > resilience against off-line brute-force attacks" > > Loop unrolling only gives more performance in very sm

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw
On Nov 28, 2009, at 11:55 AM, Ciprian Dorin, Craciun wrote: Thank you for the quick reply. (This is the kind of answer I was hopping to get. :) ) It seems that `s2k-count` escaped me. :) Maybe there should be an entry in the FAQ about this topic. Related with my question about the pas

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 November 28th 2009 for gnupg-users@gnupg.org thread "GnuPG private key resilience against off-line brute-force attacks" Loop unrolling only gives more performance in very small loops, for not so small ones there can be in fact a performance penality

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw
On Nov 28, 2009, at 3:07 PM, M.B.Jr. wrote: Hi, On Sat, Nov 28, 2009 at 1:47 PM, David Shaw wrote: The question is: what does GnuPG or OpenSSH do to slow down password brute-force? I mean does the password derivation function use some iterations? If so how many? Can I configure them? I

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw
On Nov 28, 2009, at 12:37 PM, Robert J. Hansen wrote: David Shaw wrote: Difficult question to answer, since everyone is going to wave around their opinion. :) There are some empirical facts which may be useful, though -- like observing the RC5-64 project was able to break a 64-bit key via a m

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread M.B.Jr.
Hi, On Sat, Nov 28, 2009 at 1:47 PM, David Shaw wrote: >>   The question is: what does GnuPG or OpenSSH do to slow down >> password brute-force? I mean does the password derivation function use >> some iterations? If so how many? Can I configure them? I guess so but >> I couldn't find any data o

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Nicholas Cole
On Sat, Nov 28, 2009 at 3:47 PM, David Shaw wrote: [snip] > I'd suggest starting with the various calculators on > http://www.keylength.com/ A very interesting website. I followed the links, and found this document: http://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml It seems that

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread John Clizbe
Robert J. Hansen wrote: > David Shaw wrote: >> Difficult question to answer, since everyone is going to wave around >> their opinion. :) > > There are some empirical facts which may be useful, though -- like > observing the RC5-64 project was able to break a 64-bit key via a > massive distributed

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Robert J. Hansen
David Shaw wrote: > Difficult question to answer, since everyone is going to wave around > their opinion. :) There are some empirical facts which may be useful, though -- like observing the RC5-64 project was able to break a 64-bit key via a massive distributed project that took 18 months of runti

Re: Backup of private key

2009-11-28 Thread Chris Hills
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 There is thread in the archives with the subject "TPK Archival" that may be useful. http://lists.gnupg.org/pipermail/gnupg-users/2009-March/035996.html Regards, Chris -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.9 (GNU/Linux) Comment: Using Gnu

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Mario Castelán Castro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 November 28th for gnupg-users@gnupg.org thread "GnuPG private key resilience against off-line brute-force attacks" Entropy is a relative thing AFAIR: For one who knows than a password was generated by using diceware the entropy will be 7776^n + 777

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
On Sat, Nov 28, 2009 at 5:47 PM, David Shaw wrote: > On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote: > >>   Maybe someone could clear this out (at least from GnuPG part). (My >> original post was related with both GnuPG an OpenSSH). >> >> ~~ Original post: >> >>   (I have a very

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 David Shaw escribió: > On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote: ... >>Also, how many bits of security should my password have in order >> to withstand an attack from a small / medium enterprise? (Government >> is out of the ques

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread David Shaw
On Nov 28, 2009, at 9:42 AM, Ciprian Dorin, Craciun wrote: Maybe someone could clear this out (at least from GnuPG part). (My original post was related with both GnuPG an OpenSSH). ~~ Original post: (I have a very basic question that to most of the persons reading this news-group

GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread Ciprian Dorin, Craciun
(I'll try to start a new thread from the following quotes.) On Sat, Nov 28, 2009 at 8:50 AM, Robert J. Hansen wrote: > Matt wrote: >> If I had a sufficiently good passphrase, would Google returning my >> secret key as the first hit result for every search for a day still be >> secure? > > "S

Re: Backup of private key

2009-11-27 Thread Robert J. Hansen
Matt wrote: > If I had a sufficiently good passphrase, would Google returning my > secret key as the first hit result for every search for a day still be > secure? "Secure" is not a very good word to use. It means so many different things to so many different people. "Secure" really means "in ac

Re: Backup of private key

2009-11-27 Thread Matt
Robert J. Hansen wrote: > If you are sure that no one will ever guess your passphrase, then you > could safely publish your private key in the _New York Times_. That > would be a really extreme case, but you could do it. But what if you publish it in a paper people actually _read_? :) While I un

Re: Fwd: Backup of private key

2009-11-25 Thread Robert J. Hansen
FederalHill wrote: > Would you define ascii-armored binary -> base64 conversion. http://en.wikipedia.org/wiki/Base64 ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Fwd: Backup of private key

2009-11-25 Thread FederalHill
 Would you define ascii-armored --- On Wed, 11/25/09, Brian O'Kennedy wrote: From: Brian O'Kennedy Subject: Fwd: Backup of private key To: gnupg-users@gnupg.org Date: Wednesday, November 25, 2009, 4:19 PM So this implies that I could safely upload my  ascii-armored private

Re: Backup of private key

2009-11-25 Thread Robert J. Hansen
Brian O'Kennedy wrote: > So this implies that I could safely upload my ascii-armored private > key to an email server without fear (assuming of course that my > passphrase is secure and large). Correct. You just have to make *absolutely certain* your passphrase is unguessable. If someone is abl

Fwd: Backup of private key

2009-11-25 Thread Brian O'Kennedy
So this implies that I could safely upload my ascii-armored private key to an email server without fear (assuming of course that my passphrase is secure and large). What symmetric encryption is typically used on the key itself? I'm assuming that this level of encryption is secure enough to not wor

Re: Backup of private key

2009-11-25 Thread Brian O'Kennedy
Thanks for the useful tips - I think I'll go the encrypt-upload-to-email route plus an additional paperkey option stored at relatives house in case of email service going down. thanks, Brian 2009/11/25 Ciprian Dorin, Craciun > On Wed, Nov 25, 2009 at 9:20 PM, Brian O'Kennedy > wrote: > > Hi A

Re: Backup of private key

2009-11-25 Thread Robert J. Hansen
Brian O'Kennedy wrote: > This is a complete n00b question, but I still need to get an opinion on > this. We were all new once. :) Welcome to the list! > All of these make sense to me, but aren't compatible with my ability to > lose physical things. So, what would the risks be of me using > s

Re: Backup of private key

2009-11-25 Thread Ciprian Dorin, Craciun
On Wed, Nov 25, 2009 at 9:20 PM, Brian O'Kennedy wrote: > Hi All, > This is a complete n00b question, but I still need to get an opinion on > this. > I've created myself a public/private key and got a bit concerned that if my > harddrive fails, I lost the key and all data I've ever encrypted using

Backup of private key

2009-11-25 Thread Brian O'Kennedy
Hi All, This is a complete n00b question, but I still need to get an opinion on this. I've created myself a public/private key and got a bit concerned that if my harddrive fails, I lost the key and all data I've ever encrypted using it. Advice I find around the net suggest saving it to a floppy