-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Thu, May 18, 2006 at 09:27:10AM +0200, Werner Koch wrote:
>
> I can't remember whether the card checks for correct padding in
> internal_authenticate. If it does not, you may indeed use it to
> decrypt a message.
>
ok, i've just checked the v
[EMAIL PROTECTED] writes:
> Why not? Authentication is the same as encryption with private key which
> amounts to decryption of the original content ;) (modulo padding.) I think
> that it should be possible to hack some program which would use
I can't remember whether the card checks for correct
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Wed, May 17, 2006 at 10:46:32AM -0400, David Shaw wrote:
>
> You basically can't, unless you have a copy of your authentication key
>
Why not? Authentication is the same as encryption with private key which
amounts to decryption of the origin
On Wed, May 17, 2006 at 04:07:30PM +0200, Michael Bienia wrote:
> gpg --card-status lists the subkey 02CC2588 as my authentication key. I
> created the keys in the order recommended by the subkey_howto on
> www.fsfe.org: auth, sign, encrypt.
>
> How get I this mail decrypted?
You basically can't
Hello,
I've received an encrypted mail which I now have problems to decrypt it
with my key on a openpgp card. The mail was encrypted for two recipients
but I assume this has nothing to do with my problem.
The output is (stripped the output about the second recipient):
,
| $ gpg --use-agent --