2 local user-ids, 2 distinct key pairs but only 1 user-id can sign.

2009-08-18 Thread M.B.Jr.
Hi list, this is my first message here. Firstly, thank you Werner Koch and collaborators for such a superb software. More than an enthusiast on cryptography, I am a Brazilian citizen, concerned with the privacy and authenticity "components" involved in information exchange transactions (not only

Re: 2 local user-ids, 2 distinct key pairs but only 1 user-id can sign.

2009-08-18 Thread M.B.Jr.
argument (you can set this in your gpg.conf too). > > Even after looking at the man page, I'm not entirely clear what "name" > the "--local-user" option is after (e.g. is it a name of a local user on > the system, or is it the uid name on the key). > > Reg

encrypting compression algorithms

2009-09-04 Thread M.B.Jr.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi list, when symmetrically encrypting a file, e.g.: $ gpg --output file.ods.gpg --symmetric file.ods the command above generates a "gpg" extension encrypted AND compressed file, is that correct? How do I know which compression algorithm was used?

Re: encrypting compression algorithms

2009-09-05 Thread M.B.Jr.
Hi David, thank you. On Sat, Sep 5, 2009 at 1:11 PM, David Shaw wrote: > On Sep 4, 2009, at 12:53 PM, M.B.Jr. wrote: > >> How do I know which compression algorithm was used? > > Unless you've overridden the default, it is ZIP. > Ok but in this point, my doubt is a

IDEA patent vs the recent USPTO memorandum

2009-09-16 Thread M.B.Jr.
Hi list, I've recently had access to this document, written by the "United States Patent and Trademark Office" (USPTO) which basically tries to ban software patents. The memorandum is here: http://www.uspto.gov/web/offices/pac/dapp/opla/2009-08-25_interim_101_instructions.pdf the case is, I'm rea

Re: IDEA patent vs the recent USPTO memorandum

2009-09-21 Thread M.B.Jr.
Gentlemen, I really appreciate the comments you've made on the subject and the little debates as well. That was exactly what I was expecting. Sometimes, regular users do not have the proper notion of whether some functionality merits attention. All in all, it looks like IDEA, even if totally fre

Re: Two tidbits of potential interest

2009-09-24 Thread M.B.Jr.
Hi David, about the first "tidbit": On Tue, Sep 22, 2009 at 6:08 PM, David Shaw wrote: > First of all, someone has factored a 512-bit RSA key (the one used to > protect a TI programmable calculator, it seems).  It took 73 days on a > dual-core 1900Mhz Athlon64.  It took just under 5 gigs of sto

Re: Two tidbits of potential interest

2009-09-24 Thread M.B.Jr.
On Thu, Sep 24, 2009 at 2:21 PM, David Shaw wrote: > On Sep 24, 2009, at 12:30 PM, M.B.Jr. wrote: > >> Hi David, >> >> about the first "tidbit": >> >> >> On Tue, Sep 22, 2009 at 6:08 PM, David Shaw wrote: >>> >>> First of all,

Re: Two tidbits of potential interest

2009-09-25 Thread M.B.Jr.
Hi Werner, On Fri, Sep 25, 2009 at 6:19 AM, Werner Koch wrote: > On Thu, 24 Sep 2009 21:13, marcio.barb...@gmail.com said: > >> Is this a generic asymmetric premise? >> I mean: is it valid both to the (computational) Mathematics behind >> OpenPGP's and X.509's public keys' integers? > > Yes. Al

digital signature primary key and encryption subkey

2009-11-17 Thread M.B.Jr.
Hi list, one lame confusion I'm facing now. I was reading GnuPG's "Signing Subkey Cross-Certification" page [1], and as a matter of fact, these two simple doubts did arise. Suppose one provides the command: gpg --gen-key and chooses the default "DSA and Elgamal" option. 1st doubt: DSA will be

Re: digital signature primary key and encryption subkey

2009-11-18 Thread M.B.Jr.
Hi David, On Wed, Nov 18, 2009 at 1:21 AM, David Shaw wrote: > On Nov 17, 2009, at 10:00 PM, M.B.Jr. wrote: > >> both my public and private keys will be built upon my DSA primary key >> and my Elgamal encryption subkey? > > I'm afraid I don't really understand

Re: digital signature primary key and encryption subkey

2009-11-18 Thread M.B.Jr.
Thanks again, David. The last dumb question, I promise, would be: how can I see my primary key and my subkey as well? On Wed, Nov 18, 2009 at 12:38 PM, David Shaw wrote: > On Nov 18, 2009, at 8:49 AM, M.B.Jr. wrote: > >> Hi David, >> >> >> On Wed, Nov 18, 2009

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread M.B.Jr.
Hi, On Sat, Nov 28, 2009 at 1:47 PM, David Shaw wrote: >>   The question is: what does GnuPG or OpenSSH do to slow down >> password brute-force? I mean does the password derivation function use >> some iterations? If so how many? Can I configure them? I guess so but >> I couldn't find any data o

same key pair for more than one e-mail address

2009-12-18 Thread M.B.Jr.
Suppose I'd like to "bind" the same key pair to more than one e-mail address. Is it recommended? Any comments will be greatly appreciated. Regards, Marcio Barbado, Jr. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailma

Re: How to use an "offline" primary key

2010-01-04 Thread M.B.Jr.
Hi list, I wish a great 2010 year for everybody! On Sat, Jan 2, 2010 at 11:09 AM, Sven Radde wrote: > Hello GnuPG-Users! > > With a new year comes a new keypair and this time I tried to use subkeys > to separate my secret primary key from the "day-to-day" > encryption/signing keys. Concerning

Re: Secure unattended decryption

2010-03-19 Thread M.B.Jr.
Hi Daniel, On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston wrote: > I know it's sort of a contradiction in terms, but hear me out: > > The case I'm looking at is a High Availability environment hosting a > database. The database is comprised of many Unix files, encrypted via AES, > on shared s

DRM -- digital rights management

2010-04-12 Thread M.B.Jr.
Hi, I have this simple question (sorry for it), regarding "digital rights management". As I understand, DRM in essence is the use of asymmetric cryptography, which turns simple public keys into not-publicly-available public keys. Is it correct? Regards, Marcio Barbado, Jr. _

Fwd: [Full-disclosure] Introducing TGP...

2010-06-15 Thread M.B.Jr.
Hello, there's this guy, named Timothy Mullen who recently released this TGP (Thor’s Godly Privacy) encryption utility for the cloud. Timothy wrote (note that his complete text goes forwarded below): "... I designed TGP with “encryption for the cloud” in mind.  That means that not only does TGP d