Re: Much slower than other block cipher implementations?

2013-12-05 Thread Werner Koch
On Thu, 5 Dec 2013 03:41, cai.0...@gmail.com said: As far as I know, only GnuPG 2.0.x on x86 environments supports AES-NI. Right. I addition you can't compare it with a simple block cipher as implemented by OpenSSL. OpenPGP does a lot more: It hashes the text to create a signature (which

Re: Much slower than other block cipher implementations?

2013-12-05 Thread Will Bryant
Hi Kosuke, On 5/12/2013, at 15:41 , Kosuke Kaizuka cai.0...@gmail.com wrote: Which version of GnuPG (ligcrypt) and OS are you using? We're using 1.4.11 on Ubuntu 12.04, on x86-64. The libgcrypt11 package is 1.5.0. 3. GnuPG 2.0.x on x86-64 Ligcrypt 1.5 branch does not support AES-NI yet on

Re: Any future for the Crypto Stick?

2013-12-05 Thread Paul R. Ramer
Peter Lebbing pe...@digitalbrains.com wrote: On 02/12/13 20:37, Andreas Schwier (ML) wrote: Wait a second - you can not simply hide a backdoor in a Common Criteria evaluated operating system. There are too many entities that would need to be involved in the process Why couldn't the

Re: Renewing expiring key - done correctly?

2013-12-05 Thread Ingo Klöcker
On Tuesday 03 December 2013 19:03:13 Robert J. Hansen wrote: On 12/3/2013 6:20 PM, Hauke Laging wrote: Imagine a certificate which is always prolonged for just one day. If this gets compromised then it will not be prolonged any more (at least not by its owner but we all love our highly

Re: Renewing expiring key - done correctly?

2013-12-05 Thread Hauke Laging
Am Do 05.12.2013, 19:30:07 schrieb Ingo Klöcker: your assertion is correct. In the first scenario a) the key has been compromised and revoked and you don't know that (because your last certificate update was before the revocation publishing) it is incorrect because the

Is there a chance smartcards have a backdoor? (was Re: Any future for the Crypto Stick?)

2013-12-05 Thread Peter Lebbing
On 05/12/13 13:20, Paul R. Ramer wrote: On that note, why assume that the manufacturer would not do the opposite: feign helping the spy agency by giving them a compromised ROM and then substituting a secure one on the real product. In either case, we are assuming the company would try to

Is there a chance smartcards have a backdoor? (was Re: Any future for the Crypto Stick?)

2013-12-05 Thread Peter Lebbing
On 05/12/13 13:20, Paul R. Ramer wrote: On that note, why assume that the manufacturer would not do the opposite: feign helping the spy agency By the way, there's a big difference. In the scenario that they install a backdoor but don't show it to the certification entities and such, they do

Re: Any future for the Crypto Stick?

2013-12-05 Thread Robert Holtzman
On Thu, Dec 05, 2013 at 04:20:42AM -0800, Paul R. Ramer wrote: Peter Lebbing pe...@digitalbrains.com wrote: On 02/12/13 20:37, Andreas Schwier (ML) wrote: Wait a second - you can not simply hide a backdoor in a Common Criteria evaluated operating system. There are too many entities that

Re: Any future for the Crypto Stick?

2013-12-05 Thread Einar Ryeng
On Sun, Dec 01, 2013 at 01:21:56PM +0100, arne renkema-padmos wrote: On 12/01/2013 12:45 PM, Einar Ryeng wrote: Any news on the crypto stick (or similar initiatives) would be appreciated. An OpenPGP card with something like a Gemalto SIM usb adapter would seem to fit the bill. Thanks for

Re: Renewing expiring key - done correctly?

2013-12-05 Thread Ingo Klöcker
On Thursday 05 December 2013 19:47:57 Hauke Laging wrote: Am Do 05.12.2013, 19:30:07 schrieb Ingo Klöcker: your assertion is correct. In the first scenario a) the key has been compromised and revoked and you don't know that (because your last certificate update was before

Re: Is there a chance smartcards have a backdoor? (was Re: Any future for the Crypto Stick?)

2013-12-05 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 12/05/2013 08:08 PM, Peter Lebbing wrote: On 05/12/13 13:20, Paul R. Ramer wrote: On that note, why assume that the manufacturer would not do the opposite: feign helping the spy agency by giving them a compromised ROM and then substituting a

Promoting the usage of OpenPGP (was: Re: Renewing expiring key - done correctly?)

2013-12-05 Thread Ingo Klöcker
On Thursday 05 December 2013 19:47:57 Hauke Laging wrote: BTW, OT: May I point you at this? https://bugs.kde.org/show_bug.cgi?id=318005 https://bugs.kde.org/show_bug.cgi?id=326476 https://bugs.kde.org/show_bug.cgi?id=326477 I'm sometimes pondering a different approach. I'm quite pessimistic

Re: Promoting the usage of OpenPGP (was: Re: Renewing expiring key - done correctly?)

2013-12-05 Thread Hauke Laging
Am Do 05.12.2013, 21:38:50 schrieb Ingo Klöcker: On Thursday 05 December 2013 19:47:57 Hauke Laging wrote: BTW, OT: May I point you at this? https://bugs.kde.org/show_bug.cgi?id=318005 https://bugs.kde.org/show_bug.cgi?id=326476 https://bugs.kde.org/show_bug.cgi?id=326477 I'm sometimes