On 07-07-2014 10:09, The Fuzzy Whirlpool Thunderstorm wrote:

> It depends on how important the data is. Of course, if the data is so
> important, when the expiration time comes, all the data encrypted with
> the old key need to be decrypted and encrypted with the new generated
> key.

However, if your communication lines are bugged the attacker already has
the data encrypted with the old key. This is only valid if cold storage
data is at risk. In such cases an encrypted disk using some symmetric
algorithm that is likely not vulnerable to quantum computers is a safer
option.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to