On Wed, 20 Feb 2013 06:05, jw72...@verizon.net said:
Hi, David. I appreciated your prompt reply. So with a concatenated
keyring in the format foo.pub would I first use a command like the
following one if I want to get the keys out of it in order to move
No, please don't do that! The API to
Hi all,
Wondering if someone can help me out with gpg key forwarding in the same
style that you can do with ssh. This is the best answer I've found so far:
http://superuser.com/questions/161973/how-can-i-forward-a-gpg-key-via-ssh-agent
Wondering if anyone could point me towards a cleaner
On 02/20/2013 04:29 PM, Stefan Malte Schumacher wrote:
I want to create encrypted backups with tar and gpg, which I then want to
upload to my online storage. Strangely I can't get it working.
find /mnt/raid/Dokumente/ -type f -print0 |tar cfzv | gpg --symmetric
--output 1.tar.gz.gpg
if you
On 02/20/2013 06:41 PM, Jim Treinen wrote:
I am new to GPG, specifically GPGME. I am trying to familiarize
myself with programming against the GPGME C library. I was wondering
if it is possible to explicitly specify the use of AES 256 and choose
a block mode when using the OpenPGP protocol ?
On 02/20/2013 07:11 PM, Laila Vrazda wrote:
Very well, theoretically AES-256 is less secure than AES-192.
The current best attack on AES-256 maxes out at 11 rounds; the full
AES-256 has 14 rounds. Nobody's ever demonstrated that full AES-256 is
easier to break than AES-192; and even if they
On 02/20/2013 08:23 PM, Robert J. Hansen wrote:
The current best attack on AES-256 maxes out at 11 rounds; the full
AES-256 has 14 rounds.
Doing a little more research, I found a theoretical attack on the full
-256 and -192; I was wrong to say the current best attack only worked on
a