-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Am 10.09.2013 13:45, schrieb Werner Koch: > You would also need a second public keypair to protect the second > symmetric key. If you don't, the attacker would target the public > key scheme directly - ah well that is in any case the lower hanging > fruit.
I wouldn't assme that: RSA is something taught in typical maths and computer science curriculums at universities. Factorization is a well-known problem. Symmetric ciphers, on the other hand are for specialists. So I would assume that RSA got much more attention and eyes looking at it than any symmetric cipher. Philipp -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) Comment: Using GnuPG with Icedove - http://www.enigmail.net/ iEYEARECAAYFAlJxPIAACgkQbtUV+xsoLpqAAACg9OF7Wa+MsoIbyEpcEqruFpgT rkUAniJ6U2sZExDoo/iFa4A1W4XXobaw =wl/M -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
