I found --personal-cipher-preferences, --personal-digest-preferences and
> --personal-compress-preferences but as both subkeys are RSA… it doesn't help.
That does not help with decryption. In general this problem shows up if
you receive a lot of mails using an anonymous recipients
(--thr
Hello,
Here is my setup:
* I have a primary key, which I keep in a secure location.
* from this primary key I created many subkeys, one for each of my
tool (laptop, cellphone, server, etc.)
* I also have a yubikey, which hold one of my secret subkey.
On my laptop I have only 2 secret subkeys av
On Sat, 14 Oct 2023 12:06, Martin Jambor said:
> Is there a way to specify a preferred decryption key (that is different
> from the default signing key)?
Although we meanwhile have a way to set preferences for ssh keys [1] we
don't have this for decryption keys. :-(
> Inci
tried and succeeds.
Is there a way to specify a preferred decryption key (that is different
from the default signing key)?
Incidentally, does anybody know how to convince emacs EasyPG to pass
--no-throw-keyids to GPG? :-)
Thank you,
Martin
___
Gnupg
On Wed, 18 Jan 2023 01:57:59 + (UTC)
Shannon Mess via Gnupg-users wrote:
> Can someone please remove my email address from this group! This has
> nothing to do with me!
Send an email to gnupg-users-requ...@gnupg.org?subject=unsubscribe if
you're not interested in emails from this mailing lis
ing the decryption I also tried "gpg --decrypt
> test_file.gpg" (without output file) with the 10 GB file and it took 8
> minutes and 47 seconds. I was wondering why it took longer when GnuPG
> didn't need to create an output file.
Yes that is expected. Gpg encrypt and
Thanks a lot for your reply Andre!
On 17.01.23 13:08, Andre Heinecke wrote:
Another big difference what you will see in the perfomance of GnuPG is if you
use -z 0 which disables compression.
I tried that with the 10GB file and, indeed, it was much faster. The
encryption took only 51 seconds (wi
Am Dienstag 17 Januar 2023 13:08:18 schrieb Andre Heinecke via Gnupg-users:
> Another big difference what you will see in the perfomance of GnuPG is if
> you use -z 0 which disables compression.
According to the GnuPG documentation (2.4.0)
https://gnupg.org/documentation/manuals/gnupg/GPG-Configu
Hi,
On Sunday 15 January 2023 10:52:23 CET Christoph Klassen wrote:
> When I was testing the decryption I also tried "gpg --decrypt
> test_file.gpg" (without output file) with the 10 GB file and it took 8
> minutes and 47 seconds. I was wondering why it took longer when GnuP
On Mon, 16 Jan 2023 16:47, Christoph Klassen said:
> For some reason in that test gpg didn't output anything or at least
> the PowerShell didn't show anything.
Powershell and stdout and stderr are a bit problematic. I can't
remember the details so I usually stick to cmd.exe or run tools directly
Thanks for your replies!
On 15.01.23 16:14, Ming Kuang wrote:
gpg --decrypt test_file.gpg without output file will print all the decrypted
contents on the screen, which may be the reason why it takes so long.
For some reason in that test gpg didn't output anything or at least the
PowerShell did
On Monday, January 16, 2023 9:02 AM, ángel wrote:
> On 2023-01-15 at 23:14 +0800, Ming Kuang via Gnupg-users wrote:
> > On Sunday, January 15, 2023 5:52 PM, Christoph Klassen wrote:
> > > When I was testing the decryption I also tried "gpg --decrypt
> > > test_file
On Sun, 15 Jan 2023 10:52, Christoph Klassen said:
> When I was testing the decryption I also tried "gpg --decrypt
> test_file.gpg" (without output file) with the 10 GB file and it took 8
> minutes and 47 seconds. I was wondering why it took longer when GnuPG
> didn'
On 2023-01-15 at 23:14 +0800, Ming Kuang via Gnupg-users wrote:
> On Sunday, January 15, 2023 5:52 PM, Christoph Klassen wrote:
> > When I was testing the decryption I also tried "gpg --decrypt
> > test_file.gpg" (without output file) with the 10 GB file and it took 8
>
On Sunday, January 15, 2023 5:52 PM, Christoph Klassen wrote:
> When I was testing the decryption I also tried "gpg --decrypt
> test_file.gpg" (without output file) with the 10 GB file and it took 8
> minutes and 47 seconds. I was wondering why it took longer when GnuPG
> di
Hello,
I was testing the encryption and decryption with "pure" GnuPG and
Gpg4win to compare the speed of them. What I also wanted to find out it
how long it takes to en-/decrypt larger files.
Some details of the environment for the test:
* Windows 10
* Gpg4win 4.0.3
* CPU: Int
On 1/4/2022 at 7:23 AM, "Rayapati Rama Rao (NCS)" wrote
Could you please let me know which gnupg software to download for
Linux machine to make use of gpg encryption & decryption.
Also, may I know if any packages required to install on Linux prior
to gnup
On 1/4/2022 4:17 AM, Rayapati Rama Rao (NCS) wrote:
Hi Team,
Good Morning!
Could you please let me know which gnupg software to download for Linux machine to
make use of gpg encryption & decryption.
Also, may I know if any packages required to install on Linux prior to gnupg
installation
Hello Rama Rao,
On 04.01.22 04:17, Rayapati Rama Rao (NCS) wrote:
Could you please let me know which gnupg software to download for
Linux machine to make use of *gpg encryption & decryption.*
Also, may I know if any packages required to install on Linux prior to
*gnupg* installation.
Hi Team,
Good Morning!
Could you please let me know which gnupg software to download for Linux machine
to make use of gpg encryption & decryption.
Also, may I know if any packages required to install on Linux prior to gnupg
installation.
If possible could you please provide me the step
On 2021/11/10 1:30, Werner Koch wrote:
On Fri, 29 Oct 2021 16:24, Kazunori Kobayashi said:
On modern Linux, we can change the maximum number of file descriptors
per process in some ways. This feature is a well-known way for long
time operation without reboot in cases such as server machines.
T
On Fri, 29 Oct 2021 16:24, Kazunori Kobayashi said:
> On modern Linux, we can change the maximum number of file descriptors
> per process in some ways. This feature is a well-known way for long
> time operation without reboot in cases such as server machines.
That is a known problem we recently r
Hi,
On modern Linux, we can change the maximum number of file descriptors per
process in some ways. This feature is a well-known way for long time operation
without reboot in cases such as server machines.
When I tried many iteration test of decryption via gpgme_op_decrypt() with the maximum
Hi!
On Wed, 25 Aug 2021 21:36, Thomas Cage said:
> I have installed the new 2.3.2 version which supports "decryption w/o
> public key but with correct card inserted" with commit 50293ec2eb.
The description is a bit too brief. What we do is to lookup the key on
a configured LD
Hi,
I have installed the new 2.3.2 version which supports "decryption w/o public
key but with correct card inserted" with commit 50293ec2eb.
I have tried it out with a couple files encrypted with a public key that got
lost recently but the private key remains in my smart card. $
Hi,
I have installed the new 2.3.2 version which supports "decryption w/o public
key but with correct card inserted" with commit 50293ec2eb.
I have tried it out with a couple files encrypted with a public key that got
lost recently but the private key remains in my smart card. $
On Thu, 24 Jun 2021 09:41, john doe said:
> The executable is in the subdirectory 'bin' as 'gpg.exe'.
Which is usuallay part of the PATH.
> A better idea is to use a file that contains the passthrase if you need
> to automate d/encryption or to use the agent.
An even better idea is not to use a
the decryption of these files.
Looking online, I get the basic usage: gpg -d myfile.dat.gpg
Two questions:
* I don't see the GPG (GGP4win?) executable anywhere in the GPG4Win
folders. How do I generate it?
The executable is in the subdirectory 'bin' as 'gpg.exe
Hi,
Let me start off with I am totally new to GPG/Kleopatra. We use different
encryption tools here and one of our clients uses GPG. I have already
automated the processing of files using our tool and now have a need to build
in a call to handle the decryption of these files.
Looking online
Thank you anon85786376!!
--
sergio.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
‐‐‐ Original Message ‐‐‐
On Sunday, June 6, 2021 2:24 PM, sergio via Gnupg-users
wrote:
> I found the sequence to reproduce my problem:
>
> $ rm -rf .gnupg
> $ gpg --gen-key --batch < %echo Generating a 25519 key
> Key-Type: eddsa
> Key-Curve: Ed25519
> Key-Usage: cert
> Subkey-Type: ec
int: C0E4 F2BE 8532 1C1A 3777 8963 6831 97C0 DF77
6EC0
It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.
Use this key anyway? (y/N) y
gpg: encrypted with 256-bit ECDH key, ID 683197C0DF77
> On 31. 5. 2021, at 12:30, Andreas Mattheiss
> wrote:
>
> I don't have any pinentry defined in any of my settings in .gnupg/ neither.
FYI for the archives, this was the problem. ~/.gnupg/gpg-agent.conf had the
following entry:
pinentry-program
/usr/local/MacGPG2/libexec/pinentry-mac.app/
> On 31. 5. 2021, at 12:30, Andreas Mattheiss
> wrote:
>
> Am Mon, 31 May 2021 07:59:35 +0200 schrieb Christopher Richardson via
> Gnupg-users:
>
>> This is probably something very trivial, but Im building gpg for the
>> first time since, apparently, 2013, according to my old binary. The bui
I tried the same sequence on the same host A but for new test user with
clean ~/.gnupg without success. Could you help me to debug this, please.
--
sergio.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnup
Hello,
Am Mon, 31 May 2021 07:59:35 +0200 schrieb Christopher Richardson via
Gnupg-users:
> This is probably something very trivial, but Im building gpg for the
> first time since, apparently, 2013, according to my old binary. The build
> seems fine, but ...
>
a bit of a longshot, but if your p
"Christopher W. Richardson "
gpg: using "04B90F4FA999D22FBFB769773FAE5104E3874F31" as default secret key for
signing
gpg: public key decryption failed: No pinentry
gpg: decryption failed: No pinentry
cwr@cwr2019mbp passwds % which pinentry
/usr/local/bin/pinentry
cwr@cwr2019mb
> --export-secret-keys
Sorry, this is a typo, or course. And to be absolutely sure, I re-checked:
B $ gpg --import secret.key
gpg: key : public key "name (comment) " imported
gpg: key : secret key imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: secret keys read:
rk on B:
B % echo test | gpg --encrypt --recipient | gpg --decrypt
gpg: encrypted with 256-bit ECDH key, ID , created
"name (comment) "
gpg: decryption failed: No secret key
gpg version is the same on both hosts: 2.2.27-2 from debian sid
$ gpg --list-secret-keys --with-subkey-finge
gpg --import private.key
But it doesn't work on B:
B % echo test | gpg --encrypt --recipient | gpg --decrypt
gpg: encrypted with 256-bit ECDH key, ID , created
"name (comment) "
gpg: decryption failed: No secret key
gpg version is the same on both hosts: 2.2.27-2 from debi
On Wed, 18 Nov 2020 11:51, Sirisha Gopigiri said:
> But after debugging a little we found that we are running into this
> issue only if we use gpg 2.2.4 version. We tested the same code with
You are really using a 3 year old version which was followed by 20 more
releases. You also missed 2.2.8
05
To: Sirisha Gopigiri
Cc: gnupg-users@gnupg.org ; E Guhan
; Michelle Eslinger A ;
Deepak Kataria
Subject: Re: GPG Encryption/Decryption Failing
Hello Sirisha,
I read from Mozilla's official documentation which states that SOPS
command-line client is preferred, the SOPS library should be
Hello Sirisha,
I read from Mozilla's official documentation which states that SOPS
command-line client is preferred, the SOPS library should be used only
for decryption.
The link is here: https://godoc.org/go.mozilla.org/sops/v3
>This package should not be used directly. Instead, So
Hi,
We are trying to use SOPS+GPG to encrypt/decrypt yaml files and we have written
some go wrapper using sops library to perform the required
encryption/decryption. However when trying to execute this code the gpg library
seems to be failing at keygeneration most of the time with the
On Tue, 7 Jul 2020 18:05, Andrew Pennebaker said:
> I am seeing some strange behavior with gpg --decrypt . I had to
> lookup a password recently, and so naturally pressed Control+C to cancel
> the prompt. However, when gpg terminated, it did not fully cleanup the
This will terminate gpg and thus
that when you opened gpg on the second terminal, there was
still a pinentry active on the first one, and so gpg asked gpg-agent for
decryption, which was awaiting for input on the first terminal, and was
thus "frozen".
I don't see how your Ctrl-C would have ended in such situati
Hello,
I am seeing some strange behavior with gpg --decrypt . I had to
lookup a password recently, and so naturally pressed Control+C to cancel
the prompt. However, when gpg terminated, it did not fully cleanup the
terminal. Further commands in my shell were obfuscated with asterisks (*).
That's
Hi Ingo,
On Sun, 05 Jan 2020 16:17:04 +0100
Ingo Klöcker wrote:
with your recipe
> all you have to do is to remove the file ~/.gnupg/.gpg-v21-migrated
the missing secret key was migrated again
and decryption is possible now :-)
The key listing now shows:
--- snip ---
Sec
h 4096-bit RSA key, ID 4BB3049F19616A80, created
> 2016-09-05 "Gabriele Pohl "
> gpg: decryption failed: No secret key
>
> The secret key is available:
>
> gpg> list
>
> sec rsa2048/9C7646202CE0CBB2
> created: 2012-09-05 expires: 2020-
an 3 13:07 test.txt.gpg
But decrypting fails:
$ gpg --verbose --decrypt test.txt.gpg
gpg: public key is 4BB3049F19616A80
gpg: using subkey 4BB3049F19616A80 instead of primary key 9C7646202CE0CBB2
gpg: encrypted with 4096-bit RSA key, ID 4BB3049F19616A80, created 2016-09-05
"Gabriele
Hi,
I recall from the early days of PGP that there was a way to create a corporate
key, fragmented into a certain number of potions, which would require some
quorum to be able to perform decryption. I pored over the GnuPG documentation
but could not find an equivalent. Perhaps I?m just
On 08/12/2019 18:48, Joseph Bruni via Gnupg-users wrote:
I recall from the early days of PGP that there was a way to create a corporate
key, fragmented into a certain number of potions, which would require some
quorum to be able to perform decryption. I pored over the GnuPG documentation
but
On Sun, Dec 08, 2019 at 10:48:47AM -0700, Joseph Bruni via Gnupg-users wrote:
I recall from the early days of PGP that there was a way to create a
corporate key, fragmented into a certain number of potions, which would
require some quorum to be able to perform decryption. [...] Is this
still
Joseph Bruni via Gnupg-users wrote:
> I recall from the early days of PGP that there was a way to create a
> corporate key, fragmented into a certain number of potions, which would
> require some quorum to be able to perform decryption. I pored over the GnuPG
> documentation but could
I recall from the early days of PGP that there was a way to create a corporate
key, fragmented into a certain number of potions, which would require some
quorum to be able to perform decryption. I pored over the GnuPG documentation
but could not find an equivalent. Perhaps I’m just getting the
Dear Werner,
Thank you for your prompt reaction.
I did a test an despite the error I see indeed the file is correctly decrypted.
So the conclusion is that when a file is encrypted with two recipients - when
the file is received by the second recipient it is sufficient that he has the
correspond
On Thu, 28 Nov 2019 10:57, Yves T said:
> 1. is B able to decrypt the file if he has not the secret key from A
Yes. As long as the secret key (aka private key) is available
Quick test:
$ fortune | gpgsm -ev -r 0xE297583E -r 0xCA89261C >/tmp/testenc
The first -r ist for s/n 1A02 and the
Sender A:
To recapitulate : sender A uses gpgsm with 2 recipients:
gpgsm --recipient --recipient --encrypt file.txt >
encryptedfile.gpg
Receiver B:
The receiving end B has his own correct secret key available but not the secret
key from B and gets an error when decrypting the file:
gpgsm: DB
On 2019-11-26 at 17:51 +, Yves T via Gnupg-users wrote:
> Dears,
>
> A client uses gpgsm with multiple recipient options. The first option
> refers to his own certificate, the second option to the recipients
> certificate.
> The receiving end has trouble decrypting the file. Output mentions
>
Dears,
A client uses gpgsm with multiple recipient options. The first option refers to
his own certificate, the second option to the recipients certificate.
The receiving end has trouble decrypting the file. Output mentions
gpgsm: error decrypting session key: No secret key
gpgsm: decrypting sess
On Samstag, 9. November 2019 01:42:47 CET Bobby Richardson (bobbyric) wrote:
> Hello:
>
> I need a help in my gpg decryption with crontab.
> Recently my gpg decryption with crontab started failing.
What did you change recently?
> If I do gpg decryption without crontab, it wo
Hello:
I need a help in my gpg decryption with crontab.
Recently my gpg decryption with crontab started failing.
If I do gpg decryption without crontab, it works fine.
Here is my background information:
Platform: Centos 7
gpg version: 2.0.22
# When I use crontab with my decryption script in
Hello
I am using the below command for automated decryption of PGP files (GNUPG4WIN /
Kleoptatra).
echo mypassphrase|gpg --logger-file "D:\FileShare\PGPScripts\SFTP\gpglog.log"
--pinentry-mode loopback --batch --yes --passphrase-fd 0 --decrypt-files
"D:\FileShare\Concur\WIP\*
On Tue, 5 Mar 2019 10:05, gpir...@manymore.fr said:
> In the previous version the parameter -passphrase did the trick (although
> not the most secured) but it isn't working anymore.
Given that it is an unattended environment, a passphrase to protect the
private key does not make any sense (in mo
Hi all
I'm rather new with gpg, and would like to setup and automated decryption of
incoming files into a specific directory.
In the previous version the parameter -passphrase did the trick (although
not the most secured) but it isn't working anymore.
I've ha a try with
s due to the mechanics of
symmetrically-encrypted OpenPGP messages. The passphrase is used to
decrypt the session key. A wrong passphrase just results in garbage on
decryption. This garbage then leads to the "Bad session key" message.
I wrote some stuff about possible changed handling of
On 1/20/19 5:34 PM, Peter Lebbing wrote:
Hi Frank,
On 03/01/2019 15:25, Frank Hrebabetzky wrote:
gpg: AES256 encrypted data
gpg: encrypted with 1 passphrase
gpg: decryption failed: Bad session key
This is also the error message you get when you specify the wrong
passphrase. Perhaps you
Hi Frank,
On 03/01/2019 15:25, Frank Hrebabetzky wrote:
> gpg: AES256 encrypted data
> gpg: encrypted with 1 passphrase
> gpg: decryption failed: Bad session key
This is also the error message you get when you specify the wrong
passphrase. Perhaps you mistyped the passphrase when encr
tu 18)
Since then, A wasn't re-encrypted, and I can decrypt it as before. B
however was re-encrypted, and now I cannot decrypt it anymore. Each
attempt is responded with
gpg: AES256 encrypted data
gpg: encrypted with 1 passphrase
gpg: decryption failed: Bad session ke
phrase
gpg: decryption failed: Bad session key
Regards,
--
Frank Hrebabetzky +49 / 9261 / 950 0565
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
quot;user " gpg: decryption failed: secret key not available
--
Sent from: http://gnupg.10057.n7.nabble.com/GnuPG-User-f3.html
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
subkey 1594F1502D7EF3B9 instead of primary key
AEEC5E2ED87628F5
gpg: encrypted with 2048-bit RSA key, ID 1594F1502D7EF3B9, created
2017-03-18
"Roland Siemons "
gpg: decryption failed: No secret key
#
I do not kn
the key to keyservers (that was some time ago,
that's how I've got this key with two E keys).
By the way of two encryption keys, I liked your idea:
"+ 0x04 - This key may be used as an additional decryption subkey (ADSK)."
Kind regards,
Wiktor
On 11.10.2018 11:05, Werner Koch w
On Wed, 10 Oct 2018 20:33, siem...@cleanfuels.nl said:
> gpg: decryption failed: No secret key
Well, you don't have the secret key (aka private key) to decrypt the
message.
> sec rsa2048 2009-09-27 [SCA]
> A5F3C219AB2601BEC1BCE4F2AEEC5E2ED87628F5
[..]
> ssb rsa2
1594F1502D7EF3B9, created
2017-03-18
"Roland Siemons "
gpg: decryption failed: No secret key
#
I do not know what to do with this information, and shall appreciate if
you can get me out of this troubles. For your information, this is
returned upon gpg -K:
###
subkey 1594F1502D7EF3B9 instead of primary key
AEEC5E2ED87628F5
gpg: encrypted with 2048-bit RSA key, ID 1594F1502D7EF3B9, created
2017-03-18
"Roland Siemons "
gpg: decryption failed: No secret key
#
I do not kn
On Wed, 10 Oct 2018 14:02, siem...@cleanfuels.nl said:
> I am using GPA with GnuPG 2.2.10.
IIRC, the latest released GPA version is way behind what we have in the
repo.
To figure out your problem, please run gpg on the command line:
gpg -vd -o OUTPUTFILE ENCRYPTED_FILE
check the error mess
Dear GNUPGs,
I have strange troubles with my key.
I DO can decrypt encrypted files that other people prepared for me,
using the public part of my key for encryption.
I canNOT decrypt files that were made by myself, using the same key. I
receive this error message:
"The GPGME library returned an
On Thu, Sep 20, 2018 at 04:24:01PM +0200, Werner Koch wrote:
> We try to achieve that this decryption process takes about 100ms
That is fascinating -- I did not know that decryption was calibrated
to take a certain amount of time. Very interesting. I hope I haven't
misunderstood.
Hi.
Am Mittwoch, den 08.08.2018, 00:03 -0400 schrieb Yu:
> WOW! That works.
>
> To document this, if anyone ever run into this situation:
>
> > sec# rsa4096/0xC9E7221DAFCE6539 created: 2018-08-07 expires:
> > never
>
> This is the key I need to delete from the card/yubikey.
>
> 1. gpg --del
WOW! That works.
To document this, if anyone ever run into this situation:
> sec# rsa4096/0xC9E7221DAFCE6539 created: 2018-08-07 expires: never
This is the key I need to delete from the card/yubikey.
1. gpg --delete-key 0xC9E7221DAFCE6539
2. gpg --card-status should return NONE and gpg --li
Hi.
Am Dienstag, den 07.08.2018, 19:38 -0400 schrieb Yu:
> Hi Dirk
> Thank you very much. I just want to make sure I am doing the right
> thing,
> so please excuse me if I am asking too much.
> > You should delete the complete secret key set from you keyring.
> Then
> > import the PUBLIC keys f
Hi Dirk
Thank you very much. I just want to make sure I am doing the right thing,
so please excuse me if I am asking too much.
You should delete the complete secret key set from you keyring. Then
> import the PUBLIC keys for the card keys and then do a gpg --card-
> status.
>
>
Do I just call "gp
> ssb# rsa4096/0xF7254D474BF6AD14 2018-08-07 [S]
> ssb# rsa4096/0xBAB7FE8D803C2351 2018-08-07 [E]
> ssb> rsa4096/0x676CA8641A239FE2 2018-08-07 [SA]
>
The # indicates, that the Keys are not available in the keyring.
> I am confused why I get this message:
>
> gpg:
-08-07 [SA]
I am confused why I get this message:
gpg: decryption failed: No secret key
I tried gpg --import but still doesn't help.
John-Wong:~ jwong$ gpg --import mastersub.key
gpg: key 0xC9E7221DAFCE6539: "John Wong " not changed
gpg: To migrate 'secring.gpg', w
Hi,
On Friday, May 11, 2018 10:27:34 AM CEST arinit wrote:
> Requesting inputs from anyone , if you have faced any issues on GPG
decryption which is done uninteractively
>
> The version used is : gpg (GnuPG) Version: 2.2.4 / libgcrypt 1.8.2 windows
> And automated job is sc
arinit:
>gpg --debug-all -vvv --batch --pinentry-mode loopback --passphrase-file -o
>“ouputfile” --yes –decrypt “file to decrypt”
Doesn't »--passphrase-file« need an argument, does it? If so,
gpg looks for a passphrase file named »-o«.
Friedhelm
signature.asc
Description: Digital signature
Hello ,
Requesting inputs from anyone , if you have faced any issues on GPG decryption
which is done uninteractively
The version used is : gpg (GnuPG) Version: 2.2.4 / libgcrypt 1.8.2 windows
And automated job is scheduled from controlM to run on a Windows Edition -
Windows Server 2016
Errata,
3 - Compute SHe = sk^d mod n
of course really meant:
3 - Compute SHe = SH^d mod n
Mike
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
. So let me
> combine it
> with an example.
>
> 1 - We will use an RSA keypair with modulus n, public exponent e and
> private
> exponent d
>
> 2 - Choose symmetric key: sk = 0x2dfe0af9eeb3352c390791f4710a63da
>
> 3 - Encrypt "Transfer $ 1000 to Mike" using A
t "BONAFIDEDATA"
4 - Compute s = sk^d mod n
This is "encrypting" the symmetric key sk to the public key. It is equal to what
PKCS#1 would consider the signature primitive RSASP1, mathematically equivalent
to the decryption primitive RSADP.
5 - Send s + "BONAFIDEDATA" to
*** Correcting one, somewhat important, word ***
Hi Dirk & Ken,
I'm working on a similar problem... automated decryption "in the field" and
what I have come to is this:
Encrypt the message with a symmetric algorithm, adding salt and a
hash/checksum to ensure validity. Then,
Hi Dirk & Ken,
I'm working on a similar problem... automated decryption "in the field" and
what I have come to is this:
Encrypt the message with a symmetric algorithm, adding salt and a
hash/checksum to ensure validity. Then, taking that result and signing
with a private
On 05/04/18 10:50, 周詮儒 wrote:
> Since a secret key needs a passphrase to
> use.
Let me clarify because it is not obvious: this is not the case. It is
perfectly valid to have a secret key without a passphrase. The drawback
is anyone with file access to the on-disk copy of the secret key has
full po
Hi,
On Thursday, April 5, 2018 9:46:25 PM CEST gnupg-users.d...@o.banes.ch wrote:
> Two points:
> A) You could try to automatically ssh into the remote machine to
> trigger decryption and passphrase entry.
For this usecase I'm using AgentForwarding ( https://wiki.gnupg.org/
A
h into the remote machine to
trigger decryption and passphrase entry.
B) You can secure the private key on the remote machine by using a
Secure Element. OpenPGP Card, Yubikey..
Since the key resides only on the Secure Element and can not be
exported it is save from virtual theft - obvious
Hi,
The situation is that there is a machine on remote. And I want to send an
encrypted file to that remote machine and let the machine decrypt the file
automatically. So I'm facing the problem that:
* To encrypt the file by a public key:
Which means I have to put a secret key on the remot
On Wed, 31 Jan 2018 22:25, m...@davidlasek.eu said:
> gpg (GnuPG) 2.2.4
> libgcrypt 1.8.2
> And prints:
>
>gpg: encrypted with RSA key, ID . created
>
>
>gpg: public key decryption failed: Invalid IPC response
>
>gpg: decryption failed: No
On Mon, Feb 19, 2018 at 01:30:06PM +, Green, Ian wrote:
> Hi
> Firstly, my knowledge of GPG is very weak and I am not a UNIX administrator,
> so my access and knowledge are rather limited.
>
> I have been asked to set up file encryption / decryption of files
> transferred
On 19/02/18 21:54, Peter Lebbing wrote:
> Since symmetric mode of GnuPG uses passphrase stretching, [...]
Obviously I meant key stretching.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at
1 - 100 of 483 matches
Mail list logo