-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 04/03/2014 11:27 PM, Sam Gleske wrote: > You're making the assumption that 32 ASCII characters can produce > every possible binary combination in 256 bits. I don't know how > AES handles password phrases longer than 32 bytes but the key can > be stronger I'd imagine with more random data as the key. I'm > simply presuming. >
You'd want a key derivative function that produce an output of 32 bytes to use as the actual AES key. But you are indeed correct in the point that what matter is the amount of entropy provided by the passphrase. - -- - ---------------------------- Kristian Fiskerstrand Blog: http://blog.sumptuouscapital.com Twitter: @krifisk - ---------------------------- Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 - ---------------------------- Varitatio delectat Change pleases -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJTPdKWAAoJEPw7F94F4TagiX0P/2FQ3P0tcmK8FxpBJXHXuWMN FzKl61Vmh8PJ+EGfRGMGPnvWgRgbKYARTlc8iLCxfxqv4TKoZD382e3KJmAyceWU 6MgGtGImmKsDprfxJA3re8xndv5gPQE6E34ar/qfQWcm68z64nA7n8+vfaVdLzQ4 iLdnVjk46OdYpHLupgdfT27949vPwhbcZem1m1PrXLDMyn8Ir5y8Kahg2MA7r8G6 /BpkdHvU4weIdGmNR9sg2PJu651RbOZGL7mqezhg+4Kj74U3tYG3QcPH+UKrNjq3 dRggxowMiX5rXAHyEH8UufnihjnlqMe2pzPr7WRpqp8zkrlsg/BRa1awyzIiheBu 3poiQ7Lo0dbLe0zoSUJAGKiW1E7Mjh4KGfT4AKBq/NACbqAYqDjd5Ex+fwPZMbFv Q0uhPFNkIV92ndXvYxnfLtL78qw8fzOt9/JwXJSQ+sfjxLdNz8JigDNiShfktLhI N9v9OehPRpUVILPrzgcSWB5o24Rcf1pLZL1w/hrioIJpVeMSUAmnMMcYvSAGFfJB bpCKE2BYAmx9TbcrJo/3oeBHwFql7h2ovpwTvbydjic5YvX/oe/xvzOJN6A2KjIQ fQSymNgQF0wboaAnpLXvvqy0aTZErf37JbtimEemqN7n1hbdgxUeFpn7Vgm8op1d j6zFfeqe1Y+uIRcboCXp =YzbE -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users