On 12/5/2012 6:10 PM, Max Parmer wrote:
> Here's my cite on the CAST weakness:
> http://www.schneier.com/paper-relatedkey.html

This falls squarely into the range of theoretical breaks.  Notice that
the attack requires 2**17 chosen plaintexts to all be encrypted with the
same symmetric key.  Since GnuPG uses disposable session keys, this is
pretty much completely irrelevant to GnuPG usage.


_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to