Assuming you're talking about encryption algorithms used by GnuPG, the answer is "no, these algorithms do not have publicly known known-plaintext attacks." Messages encrypted with GnuPG are always symmetrically encrypted -- when using keys, it just encrypts the random file key using RSA/DSA to allow the recipient to decrypt the message.
On Thu, Jan 30, 2014 at 1:15 PM, Donald Morgan Jr. <donaldmorga...@gmail.com > wrote: > If you know a user has a signature that they use to always end a message > with, does that data aid in the decryption of the file? Would this exploit > be applicable to symmetric encryption methods as well? > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > > -- David Tomaschik OpenPGP: 0x5DEA789B http://systemoverlord.com da...@systemoverlord.com
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users