On 12/5/2012 6:10 PM, Max Parmer wrote: > Here's my cite on the CAST weakness: > http://www.schneier.com/paper-relatedkey.html
This falls squarely into the range of theoretical breaks. Notice that the attack requires 2**17 chosen plaintexts to all be encrypted with the same symmetric key. Since GnuPG uses disposable session keys, this is pretty much completely irrelevant to GnuPG usage. _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
