Perhaps you find this relevant. I don't even begin to see why you are
interested in this. But who knows.
On Mon, Dec 26, 2011 at 9:42 PM, Werner Koch wrote:
> On Sun, 25 Dec 2011 19:00, nicholas.c...@gmail.com said:
>
> > It would be very good if there were still a way to completely 'sandox'
> (
sorry my previous message was sent in error. Please disregard.
Thank you.
On Tue, Dec 27, 2011 at 4:42 AM, Veet Vivarto wrote:
> Perhaps you find this relevant. I don't even begin to see why you are
> interested in this. But who knows.
>
> On Mon, Dec 26, 2011 at 9:42 PM, Werner Koch wrote:
>
>
On 2011-12-27 23:14, ved...@nym.hush.com wrote:
> Is there a maximum size for a passphrase for symmetric encryption
> in gnupg, or does a passphrase exceeding a certain size not add any
> further security to the process?
>
> Example,
> The session key for AES 256 is 64 hexadecimal characters.
>
Is there a maximum size for a passphrase for symmetric encryption
in gnupg, or does a passphrase exceeding a certain size not add any
further security to the process?
Example,
The session key for AES 256 is 64 hexadecimal characters.
The approximate equivalent in brute force work is 20 diceware
There may be some errors in my reply, so if so, please notify me.
On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
> On 2011-12-27 23:14, ved...@nym.hush.com wrote:
> > The approximate equivalent in brute force work is 20 diceware
> > words.
> > [ 7776^19 < 2^256 < 7776^20 ].
> >
> >
On 2011-12-28 00:27, Aaron Toponce wrote:
> On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
>> I can't tell for gpg specifically but it's not so much about
>> "characters". It's about entropy. Natural language is redundant, and
>> diceware uses words from natural language.
>
> Yes, bu
After installing the package the UDEV rule should be located at
/lib/udev/rules.d/40-cryptostick.rules
Please check.
Am 27.12.2011 09:00, schrieb mcmurphy:
> Hi,
>
> thank you for the answer. There is no difference. I'm not sure,
> whether the installation works. There is no new rule in
> /etc/u
Jerome Baum jerome at jeromebaum.com wrote on
Tue Dec 27 23:23:50 CET 2011 :
>gpg might cut off after the 64th character and drop entropy from
your >passphrase. But that sounds unlikely.
That's exactly my question.
Does gnupg have a maximum string length for a passphrase, and
restrict itself t
--trusted-key long key ID
Assume that the specified key (which must be given as a full 8 byte key ID)
is as trustworthy as one of your own secret keys. This option is useful if
you don't want to keep your secret keys (or one of them) online but still
want to be able to check the validity of a give
Am Mittwoch, 28. Dezember 2011, 03:08:15 schrieb John A. Wallace:
> Assume that the specified key (which must be given as a full 8 byte key ID)
> is as trustworthy as one of your own secret keys. This option is useful if
> you don't want to keep your secret keys (or one of them) online but still
>
On 2011-12-28 03:08, John A. Wallace wrote:
> --trusted-key long key ID
>
> Assume that the specified key (which must be given as a full 8 byte key ID)
> is as trustworthy as one of your own secret keys. This option is useful if
> you don't want to keep your secret keys (or one of them) online but
On Tue, Dec 27, 2011 at 07:54:05PM -0500, ved...@nym.hush.com wrote:
> That's exactly my question.
> Does gnupg have a maximum string length for a passphrase, and
> restrict itself to the entropy contained within that length?
Not to my knowledge. OpenPGP does not specify a maximum string length
On 28-12-2011 3:08, John A. Wallace wrote:
> --trusted-key long key ID
>
> Assume that the specified key (which must be given as a full 8 byte key
> ID)
Perhaps it would be better to expand this option so it will also accept
the full key signature (and also check against the full sig) now that
i
13 matches
Mail list logo