If you know a user has a signature that they use to always end a message
with, does that data aid in the decryption of the file? Would this exploit
be applicable to symmetric encryption methods as well?
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to