On 11/21/2014 at 1:01 PM, "Christ Schlacta" <aarc...@aarcane.org> wrote:
>
>So to summarize, the best way to try this attack would be to 
>encrypt lots
>of small messages to a dummy key and a target key because the only 
>knowable
>plaintext is the session key. However, there's no known or 
>reasonably
>suspected method of plaintext attack anyway, so all this data is 
>believed
>to be a waste. 

=====

Correct.

You could (more efficiently) isolate the Public GnuPG key as an RSA Public key,
and use an implementation of RSA that does not use padding,
and try all the plaintexts and known resulting ciphertexts, and still not 
construct the RSA Private key.


vedaal


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to