On Mon, Feb 28, 2011 at 5:38 PM, Denise Schmid wrote:
> Thanks all for your help.
>
> Now, the story gets even more funny: They claim to have used PGP split-key,
> then encrypted the files with a randomized key, then encrypted the key with
> individual keys.
>
> So far so bad. But now comes the b
> Is this a movie?
lol... worse: it is reality. I hope I'll be able to post the docs one day
soon...
--
GMX DSL Doppel-Flat ab 19,99 Euro/mtl.! Jetzt mit
gratis Handy-Flat! http://portal.gmx.net/de/go/dsl
___
Gnupg-users mailing list
Gnupg-users@gn
On 02/28/2011 05:38 PM, Denise Schmid wrote:
> Thanks all for your help.
>
> Now, the story gets even more funny: They claim to have used PGP split-key,
> then encrypted the files with a randomized key, then encrypted the key with
> individual keys.
>
> So far so bad. But now comes the best: Th
Thanks all for your help.
Now, the story gets even more funny: They claim to have used PGP split-key,
then encrypted the files with a randomized key, then encrypted the key with
individual keys.
So far so bad. But now comes the best: They claim that, because one of the
managers wasn't able to
On 2/28/11 2:07 AM, Denise Schmid wrote:
>> It depends on what you mean by a "shared key". There is just giving a
>> copy of the key to multiple people (in which case any one of them can use
>> it),
>> or there are various key splitting algorithms where a key is broken into a
>> number of pieces,
On 02/28/2011 07:07 AM, Denise Schmid wrote:
...The background of my question is that a company claims that one of their
> managers has forgotten the key and therefore, they can't decrypt some
files.
Do you know what program was used to encrypt the files?
Mark R.
_
>Date: Mon, 28 Feb 2011 08:07:03 +0100
>From: "Denise Schmid"
>To: gnupg-users@gnupg.org
>Subject: Re: Question regarding shared keys
>Message-ID: <20110228070703.164...@gmx.net>
>Content-Type: text/plain; charset="utf-8"
>Does this mean that, if
On Feb 28, 2011, at 2:07 AM, Denise Schmid wrote:
>> It depends on what you mean by a "shared key". There is just giving a
>> copy of the key to multiple people (in which case any one of them can use
>> it),
>> or there are various key splitting algorithms where a key is broken into a
>> number
> It depends on what you mean by a "shared key". There is just giving a
> copy of the key to multiple people (in which case any one of them can use it),
> or there are various key splitting algorithms where a key is broken into a
> number of pieces, and a specified subset of those pieces can come
On Feb 27, 2011, at 8:25 PM, Denise Schmid wrote:
> Hello list,
>
> first of all: Sorry if my question reaches the wrong list, but I have a
> question someone on this list may probably answer easily.
>
> If a company has shared keys: How does encryption work then? Are several
> owners of a sha
Hello list,
first of all: Sorry if my question reaches the wrong list, but I have a
question someone on this list may probably answer easily.
If a company has shared keys: How does encryption work then? Are several owners
of a share needed to encrypt data? I just try to find out how it works in
11 matches
Mail list logo