On Thu, 3 May 2012 23:15, da...@gbenet.com said:
A re-think of valid user options are required by the developers I think :)
I suggest that you use GPA or Kleopatra to modify the options. To a
large extend they make sure that the options are correct (via gpgconf).
Salam-Shalom,
Werner
On Fri, 4 May 2012 00:27, h...@qbs.com.pl said:
decision, and that's agreed by basically anybody (NIST, ECRYPT II).
Especially
when the cost of establishing the link with 8k RSA is insignificant for any
session over 5min in length (as is common in SSH).
Sorry, but that is plain nonsense.
On Fri, 4 May 2012 03:03, j...@enigmail.net said:
I suspect WK has ECC ready to go in both GnuPG 1.4 and 2.0 as soon as the ID
is approved. I know it's already present in the 2.1 beta code.
No, we don't plan to port it back to 1.4. It will actually take years
until ECC keys are in wide use
On Friday 04 of May 2012 10:37:21 Werner Koch wrote:
On Fri, 4 May 2012 00:27, h...@qbs.com.pl said:
decision, and that's agreed by basically anybody (NIST, ECRYPT II).
Especially when the cost of establishing the link with 8k RSA is
insignificant for any session over 5min in length (as is
On Fri, 4 May 2012 12:07, h...@qbs.com.pl said:
It still doesn't change the overall picture:
1. migrating to ECC is hard and complicated
Right, it will take years. But that is not a problem.
2. using 8k RSA is easy
I already told my opinion on this.
That was written in 2003, nearly 10
On 05/04/2012 06:07 AM, Hubert Kario wrote:
It still doesn't change the overall picture:
1. migrating to ECC is hard and complicated
2. using 8k RSA is easy
Nor does it change
3. using 8K RSA gives a modest increase to an already formidable
margin of security
Breaking a 128-bit keyspace
Let me turn things around. Other than providing opportunities to
discuss the practicalities of large RSA keys, is there any reason why
the agent should care what size key it is storing?
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Asking whether markets are efficient is like asking
Hello Robert, Hello all.
On 05/04/2012 02:40 PM, Robert J. Hansen wrote:
On 05/04/2012 06:07 AM, Hubert Kario wrote:
It still doesn't change the overall picture:
1. migrating to ECC is hard and complicated
2. using 8k RSA is easy
Nor does it change
3. using 8K RSA gives a modest
I am trying to decrypt file from command prompt as below and it works fine.
echo paraphase|gpg --batch --passphrase-fd 0 --decrypt-files *data*.txt.gpg
But the same command when I call from application (Informatica), it gives below
error.
Secret file not found.
Is that I need to give some
On 05/04/2012 01:45 AM, Werner Koch wrote:
On Fri, 4 May 2012 03:03, j...@enigmail.net said:
I suspect WK has ECC ready to go in both GnuPG 1.4 and 2.0 as soon as the ID
is approved. I know it's already present in the 2.1 beta code.
No, we don't plan to port it back to 1.4. It will
On 05/04/2012 10:17 AM, Milo wrote:
Well, many expect rise of the quantum computing during lives of most
of us. This can trash most (if not all) asymmetric algorithms
(Shor's algorithm)
No. It can trash *some* asymmetric algorithms. There are a good number
of asymmetric algorithms whose
On Fri, 4 May 2012 16:59, do...@dougbarton.us said:
I hope you reconsider backporting ECC to 1.4. Given some of the changes
It would be a lot of work and I doubt that we can find anyone to finance
that. In fact, finding financial support for any kind of work on GnuPG
is very hard.
you've
On Fri, 4 May 2012 14:53, mw...@iupui.edu said:
Let me turn things around. Other than providing opportunities to
discuss the practicalities of large RSA keys, is there any reason why
the agent should care what size key it is storing?
The OpenPGP parser has a limit on the size of the MPI
On Fri, 4 May 2012 16:17, gn...@oneiroi.net said:
I think I should give Werner much faster phone now ;) (on my own using
8192-bit RSA key takes about 2-4 seconds to successfully auth; phone was
2 seconds are way too long. I look at most mails not even for a second;
if I need to wait 2
I think I should give Werner much faster phone now ;) (on my own using
8192-bit RSA key takes about 2-4 seconds to successfully auth; phone was
2 seconds are way too long. I look at most mails not even for a second;
if I need to wait 2 seconds for decryption and another 2 for verifying
the
On Fri, 4 May 2012 20:54, a...@lown.me.uk said:
Might I point out that discussion is with respect to an 8k RSA SSH key
for SSH authentication, not for email. A 2 second delay during the
initialization of an SSH connection is not a problem.
The delay with SSH would even be longer. Again, it
On 04/05/12 20:54, Ali Lown wrote:
Might I point out that discussion is with respect to an 8k RSA SSH key
for SSH authentication, not for email. A 2 second delay during the
initialization of an SSH connection is not a problem.
And here is precisely something interesting: 8k RSA is discussed as
On 05/04/2012 10:08 AM, Werner Koch wrote:
On Fri, 4 May 2012 16:59, do...@dougbarton.us said:
I hope you reconsider backporting ECC to 1.4. Given some of the changes
It would be a lot of work and I doubt that we can find anyone to finance
that. In fact, finding financial support for any
Might I point out that discussion is with respect to an 8k RSA SSH key
for SSH authentication, not for email. A 2 second delay during the
initialization of an SSH connection is not a problem.
And here is precisely something interesting: 8k RSA is discussed as a method
to keep messages
On 05/04/2012 12:54 PM, Ali Lown wrote:
I see no purpose though (at this stage, with my public key spread
around a variety of locations without issue) in generating a new
'smaller' key for the sole purpose of being able to use GPG's SSH
agent, requiring me to change the public key in every
I am trying to decrypt file from command prompt as below and it works fine.
echo paraphase|gpg --batch --passphrase-fd 0 --decrypt-files *data*.txt.gpg
But the same command when I call from application (Informatica), it gives below
error.
gpg: encrypted with RSA key, ID AA
gpg:
On 05/04/2012 05:13 PM, Robert J. Hansen wrote:
On 05/04/2012 10:17 AM, Milo wrote:
Well, many expect rise of the quantum computing during lives of most
of us. This can trash most (if not all) asymmetric algorithms
(Shor's algorithm)
No. It can trash *some* asymmetric algorithms. There
Hi folks--
I'm having trouble setting up non-interactive expiration updates of a
key with a passphrase. I think i should use the --batch argument
because i want to ensure that gpg doesn't try to hang waiting on user
interaction, but when i use the --batch argument, the update isn't
saved.
let's
Am Fr 04.05.2012, 12:18:40 schrieb Rupali Chitre:
But the same command when I call from application (Informatica), it gives
below error.
gpg: encrypted with RSA key, ID AA
gpg: decryption failed: No secret key
Does the application run under the same user ID or in a chroot
On 05/04/2012 04:35 PM, Milo wrote:
Yes - niche, proof-of-concept, poorly analyzed ciphers. Let's talk
about those widely used and considered mainstream. Those are our
biggest concern.
McEliece is almost as old as RSA. Generations of graduate students have
tackled it in cryptanalysis courses.
25 matches
Mail list logo