Am 15.12.2016 um 22:17 schrieb Damien Goutte-Gattat:
> On 12/15/2016 08:35 PM, sivmu wrote:
>> From what I understand, a malicious token can e.g. perform encryption
>> operations with weak randomness to create some kind of backdoor that is
>> hard to detect.
> 
> The token is normally not used to perform any *encryption*. You encrypt
> with the public key of your correspondant, which is stored on your
> computer, not on your token (there's no need to protect it since it is a
> *public* key). You use your token to *decrypt* messages that were sent
> to you--and at that time, even if the token is malicious there's nothing
> it can do to mess with the encryption.
> 

I assumed the public key of the recipient is transferred to the token so
that it can do the encrytion internally. This is one of the things I
worry about. If the token does the encryption (and signing) operations,
it needs randomness. Something that is often messed with and hard to
produce reliably compared to a device with user interaction.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to