I know some encryption schemes reveal more information about the keys used
when an attacker has both the plaintext and the ciphertext.  In general,
how much information does GPG reveal in such situations?
How much plaintext/ciphertext matched data would an attacker need (An order
of magnitude is fine) before being able to reverse enough of the key to be
meaningful on fairly modern computers?
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to