Re: File Encryption

2014-12-27 Thread Robert J. Hansen
> Steve Gibson [0] has a slightly different opinion of the code:- > > "It is truly lovely. It is beautifully constructed. It is amazing > work to be deeply proud of." I do not personally find Gibson to be a credible commentator. He's made a lot of really embarrassing brainos over the years -- li

Re: File Encryption

2014-12-27 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Saturday 27 December 2014 at 4:28:42 AM, in , Robert J. Hansen wrote: > The > code is a mess, yes Steve Gibson [0] has a slightly different opinion of the code:- "It is truly lovely. It is beautifully constructed. It is amazin

Re: File Encryption

2014-12-26 Thread Robert J. Hansen
> Robert: In spite of the fud about TC, do you still like it? First, please don't respect my opinion on it -- I don't think I know enough to have an opinion on it! TrueCrypt has published source and a lot of people looking at it. Prior versions of TrueCrypt sometimes had appalling failures (what

Re: File Encryption

2014-12-26 Thread Stefan Caunter
On Sat, Dec 20, 2014 at 7:32 PM, Robert J. Hansen wrote: >> I'm a home user of Linux. I'm looking for an encryption utility for >> my personal password file, preferably one with a graphical user >> interface. > > Have you considered either encrypting your /home directory (with > dm-crypt, LUKS, pi

Re: File Encryption

2014-12-25 Thread Stefan Caunter
On Sat, Dec 20, 2014 at 7:32 PM, Robert J. Hansen wrote: >> I'm a home user of Linux. I'm looking for an encryption utility for >> my personal password file, preferably one with a graphical user >> interface. > > Have you considered either encrypting your /home directory (with > dm-crypt, LUKS, pi

Re: File Encryption

2014-12-23 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 23 December 2014 at 7:28:32 PM, in , Ryan Sawhill wrote: > I have no idea how much work it would require. No one's > ever expressed an interest, myself included. It was more idle curiosity really. - -- Best regards MFPA

Re: File Encryption

2014-12-23 Thread Ryan Sawhill
On Tue, Dec 23, 2014 at 2:18 PM, MFPA < 2014-667rhzu3dc-lists-gro...@riseup.net> wrote: > Since Python and GTK can both be used on Windows, does Pyrites work on > Windows as well? And/or could it be converted to a standalone Windows > executable using something like Py2exe or cx_Freeze? > I have

Re: File Encryption

2014-12-23 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tuesday 23 December 2014 at 5:45:04 AM, in , Ryan Sawhill wrote: > GUI, pyrite ( > http://softwarerecs.stackexchange.com/questions/11254/gnupg-aware-gui-to-encrypt-decrypt-pgp-ascii-on-linux Since Python and GTK can both be used on Windows,

Re: File Encryption

2014-12-22 Thread Ryan Sawhill
@Gus: I recommend you follow up on the suggestions about password managers; however, if you are dead-set on managing your own encrypted flat file and you want a GUI, pyrite ( http://softwarerecs.stackexchange.com/questions/11254/gnupg-aware-gui-to-encrypt-decrypt-pgp-ascii-on-linux ) is by far your

Re: File Encryption

2014-12-22 Thread Samir Nassar
On Friday, 2014-12-19 22:20:14 Gus Zernial wrote: > With what program and/or how can I do this? This is off topic, but here are some good introductory materials on password management, strong passwords, and using either Keepass or KeepassX Security in-a-Box: https://securityinabox.org/chapter-3

Re: File Encryption

2014-12-22 Thread C. Rossberg
On Fr, 19 Dez 2014, Gus Zernial wrote: > I'm a home user of Linux. I'm looking for an encryption utility for my > personal password file, preferably one with a graphical user interface. [...snip...] > With what program and/or how can I do this? General Description: https://en.wikipedia.org/wiki/

Re: File Encryption

2014-12-21 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Friday 19 December 2014 at 10:20:14 PM, in , Gus Zernial wrote: > I'm a home user of Linux. I'm looking for an encryption > utility for my personal password file, preferably one > with a graphical user interface. > After initial encryption of

Re: File Encryption

2014-12-20 Thread Robert J. Hansen
> I'm a home user of Linux. I'm looking for an encryption utility for > my personal password file, preferably one with a graphical user > interface. Have you considered either encrypting your /home directory (with dm-crypt, LUKS, pick your poison) and/or using an encrypted folder (TrueCrypt, etc.)

Re: File Encryption

2014-12-20 Thread Dave Pawson
Hi Gus. Using symmetrical encryption I do just that on Linux, without the GUI? With a small bash script, you could filter out just the entry you want too. I currently do it with Python and their encryption, but want it for my windows box and Linux, hence gpg. e.g. unlock is source lockp.sh # p

File Encryption

2014-12-20 Thread Gus Zernial
I'm a home user of Linux. I'm looking for an encryption utility for my personal password file, preferably one with a graphical user interface. After initial encryption of the file with a master password, I'd like to be able to decrypt and display the cleartext file, using my master password, wi

Re: Error on GPG file encryption

2014-11-04 Thread Hauke Laging
Am Di 04.11.2014, 15:14:55 schrieb Kanchan Gobari: > Urgent help required. Then you should have subscribed to the list before writing. Would have saved you 12 hours... > I have create a UNIX script for encryption but while executing the > script got the below error: > > gpg: cannot open tty `

Error on GPG file encryption

2014-11-04 Thread Kanchan Gobari
Hi, Urgent help required. I have create a UNIX script for encryption but while executing the script got the below error: gpg: cannot open tty `/dev/tty': No such device or address As got input from multiple sites - google; I found to add the '--no-tty' in the command line. But after adding

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-22 Thread Mr. Clif
Hi Ryan, Yes that is exactly the kind of front end I was looking for, and it looks very nice. Thanks for writing it. :-) Though now I have finished the stab I took at solving the problem myself, which is a much simpler command line script. You can find the two versions of it here: https://ww

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-21 Thread Ryan Sawhill
As already mentioned, you could decrypt the file to a ram disk -- the /dev/shm directory should already be there, but if you're trying to bypass creating an unnecessary file altogether, you need something else. I actually wrote a GUI frontend for this purpose (among others) a while back. It's call

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Mr. Clif
Hi Doug, Thanks for the comments. Yes the threat model is mostly the worry of having old temp files or even the original cleartext files left behind on the HD, or even worse having them backed up. ;-) At the very least I want something that tries to protect me from stupid mistakes. Yep the RA

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Doug Barton
On 01/19/2014 08:56 AM, Mr. Clif wrote: So I'm trying to get a sense from the users here if they feel that the process of using gpg for symmetric encryption is safe enough, and they are not worried about leaving clear text behind. I think you're misunderstanding a few things. First, the problem

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Mr. Clif
On 01/19/2014 03:53 AM, Johan Wevers wrote: On 19-1-2014 7:50, Mr. Clif wrote: Does anyone use symmetric file encryption? Yes, but only for encrypting files for personal use. Not in communication with others. Same here. This is why I wrote that perl script, so I wouldn't have to rem

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Johan Wevers
On 19-1-2014 12:12, Andy Ruddock wrote: > I wouldn't like to make any claims about "best practice", for the most > part I rely on defaults provided by more knowledgeable folks than myself. Although trust in that approach has gotten some drawback since the actions of RSA Inc. became public knowled

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Andy Ruddock
one got back to me. > > Does anyone use symmetric file encryption? What is the best practice > here? I heard of another solution which was to mount an encrypted > directory with fuser to drop files into. I think I would wounder how > safe the passphrase was for mounted filesystems, thoug

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Johan Wevers
On 19-1-2014 7:50, Mr. Clif wrote: > Does anyone use symmetric file encryption? Yes, but only for encrypting files for personal use. Not in communication with others. > What is the best practice here? As always, that depends on your use case and threat model. > I heard of another

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-18 Thread Mr. Clif
So no one got back to me. Does anyone use symmetric file encryption? What is the best practice here? I heard of another solution which was to mount an encrypted directory with fuser to drop files into. I think I would wounder how safe the passphrase was for mounted filesystems, though I know

Looking for simple wrapper for symmetric key file encryption

2014-01-17 Thread Mr. Clif
Greetings! I've been happily using pgp and gpg off and on for decades. One thing I never quite figured out was what the best way to use it for encrypting sensitive files on disk. After doing that one has to remember to cleanup after themselves and delete all the leftover plaintext versions of

Re: future proof file encryption

2009-03-02 Thread David Shaw
On Mar 2, 2009, at 9:19 AM, Mark H. Wood wrote: On Fri, Feb 27, 2009 at 08:37:53PM -0500, Robert J. Hansen wrote: For long-term photographic storage, make a print from photographic film on archival-quality print stock. Also, I'm given to understand that black and white photographs survive th

Re: future proof file encryption

2009-03-02 Thread Mark H. Wood
On Fri, Feb 27, 2009 at 08:37:53PM -0500, Robert J. Hansen wrote: > For long-term photographic storage, make a print from photographic film > on archival-quality print stock. Also, I'm given to understand that > black and white photographs survive the aging process much better than > color. Silve

Re: future proof file encryption

2009-03-01 Thread peter
I've been amazed by the variety of thoughtful comments since I posted. I've read all those - and a bit more besides. I'm ashamed at my ignorance when I contacted the list last Thursday. I comfort myself with the thought that it's only from ignorance that you can ever feel complete knowledge could b

Re: future proof file encryption

2009-02-28 Thread Werner Koch
On Fri, 27 Feb 2009 17:25, r...@sixdemonbag.org said: > After a little thought, it occurred to me that perhaps Sven meant there > are three errors and it's not known where. This turns into a slightly > more complex case, but still within the realm of possibility: just over > twenty-two million po

Re: future proof file encryption

2009-02-27 Thread Sven Radde
Hi! Robert J. Hansen schrieb: > After a little thought, it occurred to me that perhaps Sven meant there > are three errors and it's not known where. I also meant something like some 512 bytes of the file being unreadable because of failure of the corresponding disc sector. But I agree that singl

Re: future proof file encryption

2009-02-27 Thread David Shaw
On Feb 27, 2009, at 8:37 PM, Robert J. Hansen wrote: For long-term photographic storage, make a print from photographic film on archival-quality print stock. Also, I'm given to understand that black and white photographs survive the aging process much better than color. It's because black a

Re: [OT]future proof file encryption

2009-02-27 Thread Christopher J. Walters
John Clizbe wrote: > Christopher J. Walters wrote: >> I know quite enough about the field without your snide and foolish remarks. >> I >> refuse to engage in a battle of wits with an unarmed opponent. > > Statement one: I'll ignore as other readers may make their own opinions > as to the quality

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
(Replying to David, but it's really for Joseph) David Shaw wrote: > On Feb 27, 2009, at 6:25 PM, Joseph Oreste Bruni wrote: > >> Since we're talking about photos, what would be wrong with PRINTING >> them? I think a printed photo would last a lot longer than any >> computer-based technology. And,

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
John Clizbe wrote: > All too often we see folks too overly invested in a creation to accept > objective criticism of the idea. There also seems to be a tendency to misread what I think are very neutral statements as being very dry snark. E.g., when I said I didn't see the reasoning, and having re

Re: future proof file encryption

2009-02-27 Thread David Shaw
On Feb 27, 2009, at 6:25 PM, Joseph Oreste Bruni wrote: Okay, I've resisted getting into this discussion long enough, and I can't stands no more! Since we're talking about photos, what would be wrong with PRINTING them? I think a printed photo would last a lot longer than any computer-bas

Re: future proof file encryption

2009-02-27 Thread Michel Messerschmidt
On Fri, Feb 27, 2009 at 07:22:56PM -0500, Robert J. Hansen wrote: > Hard drives tend not to crash or overheat when they're powered down, > properly mothballed, and put in long-term storage. Unless your photos are made for your grandchildren only, I don't believe in a personal "dead" long-term sto

Re: future proof file encryption

2009-02-27 Thread John Clizbe
Christopher J. Walters wrote: > I know quite enough about the field without your snide and foolish remarks. I > refuse to engage in a battle of wits with an unarmed opponent. Statement one: I'll ignore as other readers may make their own opinions as to the quality of knowledge demonstrated. All

Re: future proof file encryption

2009-02-27 Thread Christopher J. Walters
Robert J. Hansen wrote: > I said 'about'. JPEG was standardized in 1994; PNG in 1996; SVG in 2001. > >> So tell me, what compression software are *you* talking about? > > Wavelets. Fractals. Arithmetic coding. The data compression field is > alive and well and constantly getting better. Chec

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
Christopher J. Walters wrote: > I did, later in my message. I didn't see it. Looking over it, I still don't. > I come from the early days of Fidonet, and BBS's. It is possible for > a CRC32c checksum to show "OK" when there have been changes. Has > always been this way. If you use an archiver

Re: future proof file encryption

2009-02-27 Thread Christopher J. Walters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen wrote: > Christopher J. Walters wrote: >> That's why it would be a good idea, in my opinion, to use a public >> key pair, and a weaker cipher than AES to encrypt data like family >> photos. > > I cannot for the life of me see what's

Re: future proof file encryption

2009-02-27 Thread Joseph Oreste Bruni
Okay, I've resisted getting into this discussion long enough, and I can't stands no more! Since we're talking about photos, what would be wrong with PRINTING them? I think a printed photo would last a lot longer than any computer-based technology. And, you could store them in shoeboxes.

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
Christopher J. Walters wrote: > That's why it would be a good idea, in my opinion, to use a public > key pair, and a weaker cipher than AES to encrypt data like family > photos. I cannot for the life of me see what's leading you to give this counsel. Would you care to share your reasoning? > I wo

Re: future proof file encryption

2009-02-27 Thread Christopher J. Walters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Sven Radde wrote: > Hi! > > It is probably one of the best choices for the purpose, however, in > general, long-term archival and encryption don't go together nicely. > Neither does compression or similar. Many algorithms or encryption modes > are r

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
Robert J. Hansen wrote: > With a 256-bit cipher, if you're missing 3 bits, there are only eight > possible keys. This is not an obstacle. After a little thought, it occurred to me that perhaps Sven meant there are three errors and it's not known where. This turns into a slightly more complex cas

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
Sven Radde wrote: > Imagine the session-key part of an OpenPGP message be destroyed. > Commonly, this will be far less than 1% of the actual data, but even > with 99% intact, you won't have a chance of recovering *anything* from it. Err. What? With a 256-bit cipher, if you're missing 3 bits, the

Re: future proof file encryption

2009-02-27 Thread vedaal
Sven Radde email at sven-radde.de wrote on Fri Feb 27 14:55:39 CET 2009 : >When using encrypted backups, 100% data integrity plays a much greater >role than when just storing unencrypted data. for really long term encryption, would guess that it is more likely that there would be a problem wit

Re: Re: future proof file encryption

2009-02-27 Thread Sven Radde
Hi! Robert J. Hansen schrieb: > GnuPG conforms to the OpenPGP standard for cryptography. That means > there are ... what ... 14 or so compatible implementations. You don't > have to rely on GnuPG; there are a lot of other options out there. This > is very good for purposes of long-term storage.

Re: future proof file encryption

2009-02-27 Thread Robert J. Hansen
peter wrote: > Is it true to say then, that if you wanted someone to be able to > decrypt a (symmetrically encrypted) file, they'd need to know the > algorithm used, the key and they'd also have to use the same program > to decrypt as used to encrypt the file? Let's not use words like "algorithm"

Re: future proof file encryption

2009-02-27 Thread Moritz Schulte
> Is it true to say then, > that if you wanted someone to be able to decrypt a > (symmetrically encrypted) file, they'd need to know the algorithm used, > the key and they'd also have to use the same program to decrypt as used > to encrypt the file? Not quite. In general: you shouldn't base the se

Re: future proof file encryption

2009-02-27 Thread peter
Thanks for all your responses - and the speed of them. The shoe box works fine for my pre-digital snaps - not so good for the post digital ones! Currently, I dump my camera into my computer, sort out the interesting images, archive them and dump the archive into Amazon's S3. Then I feel safe from

Re: future proof file encryption

2009-02-26 Thread Mark H. Wood
Staggering off-topic a bit, this also points out that, for a variety of reasons, if you want to store data for the long term, you need to establish a periodic review of every single item in your archive. You need to be aware of obsolescent medium types and file formats and suchlike, and recode at-

Re: future proof file encryption

2009-02-26 Thread Werner Koch
On Thu, 26 Feb 2009 13:54, s...@intertivity.com said: > i'm not aware of all file formats but you should stick with PKCS#12 format > for symmetric encryption. > It's an open standard, so I'm sure openssl and windows encryption can handle Well kind of. PKCS#12 is likely the most ugly encryption s

Re: future proof file encryption

2009-02-26 Thread gerry_lowry (alliston ontario canada)
Encryption is unnecessary with this low tech solution: burn them to DVDs, make at least two copies, put one copy in a safe deposit box at your bank. Perhaps give the other in a do not open envelope to your lawyer or someone that you can trust 100%. This is still a problem because who knows if DVD

RE: future proof file encryption

2009-02-26 Thread Sascha Kiefer
nupg-users-boun...@gnupg.org [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of peter Sent: Donnerstag, 26. Februar 2009 15:24 To: gnupg-users@gnupg.org Subject: future proof file encryption Hi, I back-up my photos to remote storage. At the moment I don't encrypt them - I don't understand e

future proof file encryption

2009-02-26 Thread peter
Hi, I back-up my photos to remote storage. At the moment I don't encrypt them - I don't understand encryption and I'm nervous of using something I don't understand. They're just family snaps, but I'd prefer they stayed private. Symmetric encryption seems a good route - all I have to remember is a

Re: Secret key holder identity (was: Local file encryption)

2007-02-21 Thread NikNot
On 2/20/07, Janusz A. Urbanowicz <[EMAIL PROTECTED]> wrote: > * without having recipient pubkey it is impossible to determine the recipient > of the message (assuming the subkey ID is not widely known) ... If the system was designed for the real world, the encrypted message would, by default, consi

Re: Secret key holder identity (was: Local file encryption)

2007-02-21 Thread vedaal
Janusz A. Urbanowicz alex at bofh.net.pl wrote on Tue Feb 20 15:24:40 CET 2007 : >* it is possible to hide recipient's completely ID by using -- throw-keyid well, not 'completely' running gpg-list-packets or pgpdump on the encrypted message, lists the key-type (dh or rsa), key size, and symmetr

re: Secret key holder identity (was: Local file encryption)

2007-02-21 Thread vedaal
vedaal at hush.com vedaal at hush.com Tue Feb 20 18:16:52 CET 2007 wrote: > running gpg-list-packets or pgpdump on the encrypted message, lists the key-type (dh or rsa), key size, and symmetric algorithm used sorry, my mistake ;-(( pgpdump doesn't list which symmetric algo, only lists that an

Re: Secret key holder identity (was: Local file encryption)

2007-02-21 Thread Sven Radde
NikNot schrieb: > Unfortunately, the whole GPG, with WebOfTrust construct, makes the > assumption that there is no need whatsoever to protect the identity of > the secret key holder You have, however, the possibility of using pseudonyms as UID. Only the signers of your key would have to know about

Re: Secret key holder identity (was: Local file encryption)

2007-02-21 Thread NikNot
On 2/20/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > pgpdump doesn't list which symmetric algo, > only lists that an mdc was or wasn't used The attacker performing large-scale traffic uses his own software that is - so it must be presumed - capable of distilling all (to him) usefull informat

Re: Secret key holder identity (was: Local file encryption)

2007-02-20 Thread Janusz A. Urbanowicz
On Mon, Feb 19, 2007 at 10:54:17AM -0800, NikNot wrote: > On 2/19/07, Adam Funk <[EMAIL PROTECTED]> wrote: > >Is there any reason to physically secure your *public* keyring in > >... (Well, I suppose you might want to hide your secret identity!) > > Unfortunately, the whole GPG, with WebOfTrust c

Re: Secret key holder identity (was: Local file encryption)

2007-02-19 Thread NikNot
On 2/19/07, Joseph Oreste Bruni <[EMAIL PROTECTED]> wrote: > It's funny you mention this: I got into an argument with a > "consultant" about how X.509 certificates are a privacy violation > because your identity is encoded into the "subject" field. I kept > asking him, "How would you know whose ce

Re: Local file encryption

2007-02-19 Thread John Clizbe
Adam Funk wrote: > On 2007-02-19, John Clizbe wrote: > >> The passphrase is only one protection on your keypair and it's >> pretty much the protection of last resort - given an easily >> guessable/brute-forced passphrase, it's "Game-Over." if an attacker >> gets access to the keyring files. Anothe

Re: Secret key holder identity (was: Local file encryption)

2007-02-19 Thread Joseph Oreste Bruni
On Feb 19, 2007, at 11:54 AM, NikNot wrote: On 2/19/07, Adam Funk <[EMAIL PROTECTED]> wrote: Is there any reason to physically secure your *public* keyring in ... (Well, I suppose you might want to hide your secret identity!) Unfortunately, the whole GPG, with WebOfTrust construct, makes

Secret key holder identity (was: Local file encryption)

2007-02-19 Thread NikNot
On 2/19/07, Adam Funk <[EMAIL PROTECTED]> wrote: > Is there any reason to physically secure your *public* keyring in > ... (Well, I suppose you might want to hide your secret identity!) Unfortunately, the whole GPG, with WebOfTrust construct, makes the assumption that there is no need whatsoever

Re: Local file encryption

2007-02-19 Thread Adam Funk
On 2007-02-19, John Clizbe wrote: > The passphrase is only one protection on your keypair and it's > pretty much the protection of last resort - given an easily > guessable/brute-forced passphrase, it's "Game-Over." if an attacker > gets access to the keyring files. Another protection is to > phys

Re: Local file encryption

2007-02-19 Thread Janusz A. Urbanowicz
On Mon, Feb 19, 2007 at 09:21:56AM -0500, [EMAIL PROTECTED] wrote: > I have been using gpg to encrypt/decrypt files on my computer "for my > eyes only". I have been using my public/private keypair on my keyring > to do so. I just discovered that I can use encrypt/decrypt local > files using a sy

Re: Local file encryption

2007-02-19 Thread John Clizbe
[EMAIL PROTECTED] wrote: > I have been using gpg to encrypt/decrypt files on my computer "for my > eyes only". I have been using my public/private keypair on my keyring > to do so. I just discovered that I can use encrypt/decrypt local > files using a symmetric cipher--i.e., you enter one secret

Local file encryption

2007-02-19 Thread eemaestro
I have been using gpg to encrypt/decrypt files on my computer "for my eyes only". I have been using my public/private keypair on my keyring to do so. I just discovered that I can use encrypt/decrypt local files using a symmetric cipher--i.e., you enter one secret passphrase to encrypt and then e

Re: file encryption and integrity check

2006-03-11 Thread Simon H. Garlick
On 2/22/06, Vladimir Doisan <[EMAIL PROTECTED]> wrote: > 512 MB backup file > GnuPG-64 | GnuPG-32 > --- > twofish (256)33.5s (15.3 mbps) | 32.2s (15.9 mbps) > aes (12

Re: file encryption and integrity check

2006-03-10 Thread Vladimir Doisan
Yes, I did exactly the same for my encrypted backups, only I chose Twofish due to speed advantage (TW256 - 16.2 mbps vs. AES256 - 12.6 mbps). With compression enabled - encryption speed was within 0.5 mbps across all ciphers at around 12 mbps. I did switch over to public key encryption last month.

Re: file encryption and integrity check

2006-03-10 Thread Vladimir Doisan
Yes, I did exactly the same for my encrypted backups, only I chose Twofish due to speed advantage (TW256 - 16.2 mbps vs. AES256 - 12.6 mbps). With compression enabled - encryption speed was within 0.5 mbps across all ciphers at around 12 mbps. I did switch over to public key encryption last month.

Re: file encryption and integrity check

2006-02-26 Thread Johan Wevers
David Shaw wrote: >This is correct. Of course, it's possible that GnuPG doesn't >recognize a particular kind of compression. If I recall, it looks for >bzip, gzip, and zip. A simple default test would be of course to check if the used compression algorithm could decrease the file size: this wou

Re: file encryption and integrity check

2006-02-22 Thread David Shaw
On Wed, Feb 22, 2006 at 05:49:40PM +1030, Alphax wrote: > Francesco Turco wrote: > > > i have disabled compression becouse files i have to encrypt are already > > compressed, and compression takes much more time then encryption. > > > > do you think it is a good choice? > > > > IIRC GnuPG will

Re: file encryption and integrity check

2006-02-21 Thread Alphax
Francesco Turco wrote: > i have disabled compression becouse files i have to encrypt are already > compressed, and compression takes much more time then encryption. > > do you think it is a good choice? > IIRC GnuPG will detect if data is compressed before it tries to compress it; if so, it won

Re: file encryption and integrity check

2006-02-21 Thread Francesco Turco
Roscoe ha scritto: Sure will. gpg -c is what you want. Make sure you are using a MDC, which means either using one of the 128bit blocksize ciphers (your gpg will probably use AES256 by default, which is good - gpg -vc to find out) or passing the --force-mdc option. so no need to hash files

Re: file encryption and integrity check

2006-02-20 Thread Eric
On Mon, 2006-02-20 at 17:46 +0100, Francesco Turco wrote: > i'd like to know if gnupg is a good choice for encrypting files with a > password and if it is possible to check if an encrypted file is > corrupted or not (integrity check). my goal is to burn some files on cds > and protect them both

Re: file encryption and integrity check

2006-02-20 Thread David Shaw
On Mon, Feb 20, 2006 at 05:46:29PM +0100, Francesco Turco wrote: > hello, > > i am very new with gnupg and cryptography in general. > > i'd like to know if gnupg is a good choice for encrypting files with a > password and if it is possible to check if an encrypted file is > corrupted or not (in

Re: file encryption and integrity check

2006-02-20 Thread Roscoe
Sure will. gpg -c is what you want. Make sure you are using a MDC, which means either using one of the 128bit blocksize ciphers (your gpg will probably use AES256 by default, which is good - gpg -vc to find out) or passing the --force-mdc option. If you want protection in the way of recovering

file encryption and integrity check

2006-02-20 Thread Francesco Turco
hello, i am very new with gnupg and cryptography in general. i'd like to know if gnupg is a good choice for encrypting files with a password and if it is possible to check if an encrypted file is corrupted or not (integrity check). my goal is to burn some files on cds and protect them both fr