On Wed, 30 Oct 2024 17:53, Robert J. Hansen said:
>> Counter modes are evil and thus not used.
>
> Evil? Howso? I know there's a malleability problem, but GnuPG has
> used an HMAC since what, 1999, so that problem was mitigated decades
> ago. Is there another set of problems I'm unaware of?
All
Counter modes are evil and thus not used.
Evil? Howso? I know there's a malleability problem, but GnuPG has used
an HMAC since what, 1999, so that problem was mitigated decades ago. Is
there another set of problems I'm unaware of?
OpenPGP_0x1E7A94D4E87F91D5.asc
Description: OpenPGP publ
On Tue, 29 Oct 2024 14:21, Robert J. Hansen said:
> Depends on which version of GnuPG you're using. Older versions used
> an idiosyncratic cipher feedback mode, newer versions use counter mode
The classical mode is CFB with a slightly different handling of the IV.
Modern versions create keys whi
On Tuesday, 29 October 2024 18:07:46 GMT Robert J. Hansen via Gnupg-users wrote:
> Unfortunately, I don't remember offhand whether there's a command-line
> flag to force a particular AES256 key.
There is --override-session-key, but IIRC it can only be used to *decrypt*, not
*encrypt*.
I agree w
Please don't send HTML to this list. Some of the people you really hope
will see your email won't look at HTML email. :)
I am having no luck with trying to encrypt a file with a key that I
would like to use.
This isn't really a GnuPG use case. If you're looking for an AES256
encryption or
Is AES256 using ecb or cbc mode?
Depends on which version of GnuPG you're using. Older versions used an
idiosyncratic cipher feedback mode, newer versions use counter mode (I
believe).
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lis