Assuming you're talking about encryption algorithms used by GnuPG, the
answer is "no, these algorithms do not have publicly known known-plaintext
attacks."  Messages encrypted with GnuPG are always symmetrically encrypted
-- when using keys, it just encrypts the random file key using RSA/DSA to
allow the recipient to decrypt the message.


On Thu, Jan 30, 2014 at 1:15 PM, Donald Morgan Jr. <donaldmorga...@gmail.com
> wrote:

> If you know a user has a signature that they use to always end a message
> with, does that data aid in the decryption of the file? Would this exploit
> be applicable to symmetric encryption methods as well?
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>


-- 
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to