Hi all and thank you for GnuPG!
I was wondering whether one attacker who'd be in possess of my private and
public keys, my entire archive of encrypted data, and a common file which for
sure is just plain the same as an encrypted one of my backup, could in some
way and time recover my
When in doubt, use brute force. So, the answer is, it depends on the
strenght of your passphrase.
--David.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
=~~=~=~=~=~=~=~=~=~=~=~=~=~~=
19:41 (sabato), David Picón Álvarez:
When in doubt, use brute force. So, the answer is, it depends on the
strenght of your passphrase.
--David.
So if the strenght of passphrase is something like 25 chars (a-Z,0-9,non
alphanumeric) I can rest assured nobody
On Sat, Jan 19, 2008 at 08:54:26PM +0100, [EMAIL PROTECTED] wrote:
=~~=~=~=~=~=~=~=~=~=~=~=~=~~=
19:41 (sabato), David Pic?n ?lvarez:
When in doubt, use brute force. So, the answer is, it depends on the
strenght of your passphrase.
--David.
So if the strenght of passphrase is something
[EMAIL PROTECTED] wrote:
gpg, but let my keys available to the attacker, would he theorically be able
to crack my passphrase and recover all of my archive?
Yes.
Please note how you qualified that: /theoretically./ In practice, given
a good passphrase, this is highly nontrivial.
[EMAIL PROTECTED] wrote:
So if the strenght of passphrase is something like 25 chars (a-Z,0-9,non
alphanumeric) I can rest assured nobody today or in a year could possibly
decrypt even someone with a distributed super calculus hardware power, is it?
Depends. English text has about 1.5 bits