Wind river

2014-10-23 Thread Michael Anders
t you for defending your (the us) administration, yet in my opinion both our administrations deserve some bashing once in a while for excessive ignorance and/or sluggishness. Cheers, Michael Anders ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Wind river

2014-10-21 Thread Michael Anders
ely gone nuts and assumes others are too stupid to implement strong crypto by themselves or else -and this semms more probable to me- they go for a cheap short term advantage and stage a theater to make others believe the software that was exported would be secure while it is not... regards

Re: It's time for PGP to die

2014-08-18 Thread Michael Anders
ork plugged into it. I wouldn't want to code it. By the way - Green (rightfully) critizises PGP for bad defaults (e.g. using SHA1) yet he praises TextSecure which heavily relies on SHA1. This leaves me baffled.   Cheers,   Michael Anders     __

Re: Fwd: It's time for PGP to die.

2014-08-17 Thread Michael Anders
with me on this point, yet I have never heard a convincing argument for the MAC in an asymmetric cipher.) If you want authenticity, you have to have the message or cipher be digitally signed by the sender. For me the critcism of PGP is clearly unfair regarding this second aspect. Regards,

Re: Gnupg-users Digest, Vol 131, Issue 15

2014-08-13 Thread Michael Anders
ome improvement compared to the publicly known methods to factor RSA moduli, expect such improvement from other sources or else just want to push ECC. (I like ECC -> google "open source elliptic curve cryptography".)) Cheers Michael Anders ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: how to do

2014-07-14 Thread Michael Anders
t keys, however, and that you could always at least embed the exported subkey into a newly created parent key structure and newly design whatever sub/super-key structure you like around the exported key. So unless there is convincing cryptographic reasoning about why you cannot do something to the key

Re: Gnupg-users Digest, Vol 128, Issue 24

2014-05-17 Thread Michael Anders
> nt-Type: text/plain; charset=ISO-8859-1 > > > Now where did you calculate that from? > > $dS = \frac{\delta Q}{T}$ > > Second Law of Thermodynamics, which you just broke. Have a nice day. > The (cold) system where the calculation is done and the (hot) system the result is transferred only ex

Re: GPG's vulnerability to quantum cryptography

2014-05-16 Thread Michael Anders
On Wed, 2014-05-14 at 22:26 +0200, gnupg-users-requ...@gnupg.org wrote: > If you want to run the temperature lower than the ambient > temperature > of the cosmos (3.2K), you have to add energy to run the heat pump -- > and the amount of energy required to run that heat pump will bring > your

GPG's vulnerability to quantum cryptography

2014-05-14 Thread Michael Anders
> > GPG encrypted data (using RSA) can be collected today and easily decrypted > after 50-100 years using a quantum computer. See: > https://en.wikipedia.org/wiki/Shor%27s_algorithm Well let's see. Usually in a new technology, once you are really going to apply it in the real world, new problems

Re: Multiple Subkey Pairs

2014-03-17 Thread Michael Anders
of cryptography in many contexts. There is no such thing as attrition of security by heavy usage of a public RSA or ECC key. When it comes to system compromise leading to broken security. This is not kind of an aging process smoothly proceeding with time and eventually leading to death. They target

Re: Multiple Subkey Pairs

2014-03-14 Thread Michael Anders
such thing as attrition of security by heavy usage of a public RSA or ECC key.   When it comes to system compromise leading to broken security. This is not kind of an aging process smoothly proceeding with time and eventually leading to death. They target you or they don't.   ch

Encrypting File with passphrase,

2014-03-13 Thread Michael Anders
iven when it is not needed. This seems reasonable to me. regards Michael Anders (http://www.fh-wedel.de/~an/) ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: key generation: paranoia mode - explicit random input

2014-02-27 Thread Michael Anders
ave been a keylogger in place and security of the key is gone. If you consider the NSA to be a benevolent organization, you might make a distinction between security against criminals and security against the NSA, but that is politics and not cryptography. Cheers, Mich

Trying to understand the bond between master and subordinal key pairs

2014-02-12 Thread Michael Anders
PGP, which thankworthily is usually more or less hidden from the user anyways? A good reason would help the complicated workings to stick with my memory :-) Why would we need more than one key and this hierarchy on top of it? (Proper padding according to the standard to my knowledge removes even the dan

Subject: openpgp card and basiccard RNG

2014-02-05 Thread Michael Anders
iberately and unnecessarily, which the user has to trust. This pattern smells like a backdoor mechanism to me. I would outrighly reject to use such a card. Cheers Michael Anders ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-30 Thread Michael Anders
cally sound. If you are interested in this topic, you may have fun listening into Dan Bonehs great lectures on cryptography in coursera (for free). https://www.coursera.org/courses?orderby=upcoming&search=cryptography regards Michael Anders __

Re: Any way for two correspondents to set up gnupg within a few moments without having to become expert?

2014-01-21 Thread Michael Anders
GnuPG config files and tranferring to and fro windows and linux. There seems to be a danger to mess up things using wrong editor settings. I don't know if hash preference information is additionally attached to keys. I would guess it is not, it wouldn't make sense to

Re: Any way for two correspondents to set up gnupg within a few moments without having to become expert?

2014-01-21 Thread Michael Anders
ecurity: https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html regards, Michael Anders ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Any way for two correspondents to set up gnupg within a few moments without having to become expert?

2014-01-21 Thread Michael Anders
est some minutes in understanding what asymmetric cryptography is about, however. That should be well within the scope of people with normal intelligence. Without that very basic understanding, using GnuPG(or other public key crypto) would be reckless nonsense anyways. Becoming a console wizar

for GnuPG GUI, force gpg response in english language?

2013-12-30 Thread Michael Anders
I wish you all had a Merry Christmas and will have a Happy New Year, Michael Anders ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: ECC curves used in gnupg?

2013-12-18 Thread Michael Anders
On Tue, 2013-12-17 at 13:01 -0600, Anthony Papillion wrote: > I know that gnupg is experimenting with ECC and I'm wondering which > curves the team has decided to use. I know there are some curves that > are now suspected of being tainted by the NSA through NIST. Has the > gnupg team ruled using th