On Wed, 30 Oct 2024 17:53, Robert J. Hansen said:
>> Counter modes are evil and thus not used.
>
> Evil? Howso? I know there's a malleability problem, but GnuPG has
> used an HMAC since what, 1999, so that problem was mitigated decades
> ago. Is there another set of problems I'm unaware of?
All
Counter modes are evil and thus not used.
Evil? Howso? I know there's a malleability problem, but GnuPG has used
an HMAC since what, 1999, so that problem was mitigated decades ago. Is
there another set of problems I'm unaware of?
OpenPGP_0x1E7A94D4E87F91D5.asc
Description: OpenPGP publ
On Tue, 29 Oct 2024 14:21, Robert J. Hansen said:
> Depends on which version of GnuPG you're using. Older versions used
> an idiosyncratic cipher feedback mode, newer versions use counter mode
The classical mode is CFB with a slightly different handling of the IV.
Modern versions create keys whi
On Tuesday, 29 October 2024 18:07:46 GMT Robert J. Hansen via Gnupg-users wrote:
> Unfortunately, I don't remember offhand whether there's a command-line
> flag to force a particular AES256 key.
There is --override-session-key, but IIRC it can only be used to *decrypt*, not
*encrypt*.
I agree w
Please don't send HTML to this list. Some of the people you really hope
will see your email won't look at HTML email. :)
I am having no luck with trying to encrypt a file with a key that I
would like to use.
This isn't really a GnuPG use case. If you're looking for an AES256
encryption or
Is AES256 using ecb or cbc mode?
Depends on which version of GnuPG you're using. Older versions used an
idiosyncratic cipher feedback mode, newer versions use counter mode (I
believe).
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lis
I am having no luck with trying to encrypt a file with a key that I would like
to use.this is the command I used: gpg -e -a --symmetric --cipher-algo
AES256 -k keysupplied --input file.txt --output file .gpgwhat am I doing
incorrect?Is AES256 using ecb or cbc mode?Can I use my key that with t
Werner Koch schreef:
<...snipped>
> I am sure others will start a new debate now what to do, but I consider
> such a debate more or less academic.
Grin ;-)
--
Henk M. de Bruijn
Mozilla Thunderbird 2.0.0.22 (20090605) wit
Kevin Hilton wrote:
> Although I usually get a wide range of responses, is there any
> practical advice an end-user should take away from the recent AES256
> attacks as described here?
To repeat my usual advice: "Unless you know what you're doing and why,
stick with the defaults."
The AES256 a
On Aug 19, 2009, at 9:28 AM, Kevin Hilton wrote:
Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described
here:http://www.schneier.com/blog/archives/2009/07/another_new_aes.html?
Should I continue to
The successful attacks were on reduced-round versions of the algorithm, not on
the current implementations. The article was mostly informative for crypto
geeks as a state-of-the-art. The practical advice for end-users would be to
stick with the defaults for now.
Joe
On Wednesday, August 19,
On Wed, 19 Aug 2009 15:28, kevhil...@gmail.com said:
> the article interesting (not sure if I understood a lot of the blog
> comments), is there any practical advice I should take away from it as
> it relates to GnuPG?
Don't care about it. It is no threat to use AES 256 or AES 128. The
remarkab
Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described
here:http://www.schneier.com/blog/archives/2009/07/another_new_aes.html?
Should I continue to use AES256 (double AES) or default to single AES
or
13 matches
Mail list logo