On 11/21/2014 at 1:01 PM, "Christ Schlacta" <aarc...@aarcane.org> wrote: > >So to summarize, the best way to try this attack would be to >encrypt lots >of small messages to a dummy key and a target key because the only >knowable >plaintext is the session key. However, there's no known or >reasonably >suspected method of plaintext attack anyway, so all this data is >believed >to be a waste.
===== Correct. You could (more efficiently) isolate the Public GnuPG key as an RSA Public key, and use an implementation of RSA that does not use padding, and try all the plaintexts and known resulting ciphertexts, and still not construct the RSA Private key. vedaal _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users