A correction:

You could use /dev/urandom to add 1K of random data to the start of your
archive as follows:
        head -c 1024 /dev/urandom > NEW
        cat ORIGINAL >> NEW

On Wed, 2003-02-19 at 14:18, Arthur Britto wrote:
> Here is an example command to use symmetrical encryption with gpg:
> 
>     cat passphrase.txt | gpg -c --no-secmem-warning --cipher-algo
> RIJNDAEL256 --command-fd 0 --yes -o OUTPUT INPUT
> 
> If you choose a pass phrase you can remember, you need never worry about
> loosing a floppy or piece of paper with a private key.
> 
> Having known plain text in the data you encrypt significantly weakens
> your security.
> 
> In particular, since you are making multiple files with the same pass
> phrase, having the same known plain text could be particularly bad.
> 
> If you are using tar or a similar program to create the file which you
> are backing up, then the back up file will have a fixed sequence of
> characters at the very beginning.  This is known plain text.
> 
> Unfortunately, I am not able to recall where I heard this and would
> appreciate if anyone can provide the source or refute the following:
> 
> To eliminate a weakness with known plain text at the very beginning of a
> file to be encrypted, you can insert a fixed amount of random data
> before the data you are encrypting.  When decrypting your data, you
> simply discard the random data after decryption.  Ideally gpg would do
> this for you, but I have not checked the program to see if it does this.
> 
> Ideally you could use /dev/random for random data, as this provides real
> randomness vs pseudo-randomness of /dev/urandom.  Unless you have a real
> random number source, using /dev/random in a script can cause the script
> to hang until enough entropy is collected.
> 
> For example, you could use /dev/random if: (1) you are around to move
> the mouse and type keys on the keyboard to generate entropy or (2) you
> have an Intel random number generator your computer and you having
> installed the intel-rng-tools ebuild:
> http://bugs.gentoo.org/show_bug.cgi?id=8997
> 
> You could use /dev/urandom to add 1K of random data to the start of your
> archive as follows:
>         head -c 1024 /dev/urandom > NEW
>         cat INPUT >> OUTPUT
> 
> Hope this helps,
> 
> Arthur
> 
> On Wed, 2003-02-19 at 07:59, Bruno Lustosa wrote:
> > * Michael Jinks <[EMAIL PROTECTED]> [18-02-2003 19:03]:
> > > If what you want is to store a bunch of stuff, for however long, in a
> > > small number of encrypted cpio (or tar or whatever) archives, are there
> > > really going to be so many of them that it justifies a script with a
> > > password in it?  And, if you're worried enough about privacy to want to
> > > store your files in an encrypted form, why would you also simultaneously
> > > want to store the key to unlock them in a script on the same system?  If
> > > you store the password+script elsewhere, you're back to the same problem
> > > you had with keeping a key on a floppy, only now it's a script instead of
> > > a key.
> > 
> > Also, if you think that floppies aren't all that reliable, you could
> > still print (on paper) the ascii armoured private key and store it
> > somewhere safe.
> > In case the floppy doesn't work anymore, you could still get the paper,
> > type it and re-import on gpg. Of course, would be a tedious thing to do,
> > but that's the last resort thing, isn't it?
> > 
> > Just my $.02
> 
> 
> --
> [EMAIL PROTECTED] mailing list


--
[EMAIL PROTECTED] mailing list

Reply via email to