On January 30, 2014 1:15:08 PM PST, "Donald Morgan Jr." <[email protected]> wrote: >If you know a user has a signature that they use to always end a >message >with, does that data aid in the decryption of the file? Would this >exploit >be applicable to symmetric encryption methods as well?
A common form of cryptanalytic research involves trying to find a faster than brute force method of discovering a key when several plaintexts are know. The symmetric ciphers that are employed in GnuPG are, to my knowledge, very good in their resistance to cryptanalysis, including this method. Just know that no one is going to attack to the cipher itself to get to your messages. There are much easier methods such as installing a key logger. Why beat the door down if you can open the window? Cheers, --Paul -- PGP: 3DB6D884 _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
