On 31/10/13 16:37, [email protected] wrote: > The advantage is, that if it should ever be possible to brute force the > keyspace of one key, then NONE of the possible elements of the keyspace > (including the *correct* key) will result in an identifiable *correct* > plaintext. It will only result in random ciphertext.
Then again: If brute forcing a key costs you all the energy in this solar system, you don't have any light to read the decrypted message by. And that's what we're talking about here. So: forget about brute-forcing. HTH, Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at <http://digitalbrains.com/2012/openpgp-key-peter> _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
