> There's still a big difference between trying to brute-force a
> cryptographically-strong 64-bit key, and applying dictionary attacks
> against against an English-based passphrase.

If there exists a difference, I'm unaware of it.

> If I recall correctly,
> none of the attacks you mentioned attacked the passphrase protecting a
> secret key (which is what we're talking about); rather, they were
> attempts to recover plaintext in the *absence* of the secret key by
> trying all possible decryption keys within the keyspace.

And that's exactly what we want to do when we break a passphrase: recover the 
plaintext of the (encrypted) private-key material by trying all possible 
decryption keys within the keyspace of the symmetric key which encrypts it.  
The passphrase generates the session key.

> In short, I believe the context is different, and that passphrase
> attacks against the secret key are vulnerable in a way that attacks on
> ciphertext are not.

I emphatically disagree.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to