On 07-07-2014 10:09, The Fuzzy Whirlpool Thunderstorm wrote: > It depends on how important the data is. Of course, if the data is so > important, when the expiration time comes, all the data encrypted with > the old key need to be decrypted and encrypted with the new generated > key.
However, if your communication lines are bugged the attacker already has the data encrypted with the old key. This is only valid if cold storage data is at risk. In such cases an encrypted disk using some symmetric algorithm that is likely not vulnerable to quantum computers is a safer option. -- ir. J.C.A. Wevers PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users