On Feb 28, 2011, at 2:07 AM, Denise Schmid wrote:
It depends on what you mean by a shared key. There is just giving a
copy of the key to multiple people (in which case any one of them can use
it),
or there are various key splitting algorithms where a key is broken into a
number of pieces,
Date: Mon, 28 Feb 2011 08:07:03 +0100
From: Denise Schmid chinati...@gmx.ch
To: gnupg-users@gnupg.org
Subject: Re: Question regarding shared keys
Message-ID: 20110228070703.164...@gmx.net
Content-Type: text/plain; charset=utf-8
Does this mean that, if you want to encrypt
a file, everybody has
On 02/28/2011 07:07 AM, Denise Schmid wrote:
...The background of my question is that a company claims that one of their
managers has forgotten the key and therefore, they can't decrypt some
files.
Do you know what program was used to encrypt the files?
Mark R.
On 2/28/11 2:07 AM, Denise Schmid wrote:
It depends on what you mean by a shared key. There is just giving a
copy of the key to multiple people (in which case any one of them can use
it),
or there are various key splitting algorithms where a key is broken into a
number of pieces, and a
Thanks all for your help.
Now, the story gets even more funny: They claim to have used PGP split-key,
then encrypted the files with a randomized key, then encrypted the key with
individual keys.
So far so bad. But now comes the best: They claim that, because one of the
managers wasn't able to
On 02/28/2011 05:38 PM, Denise Schmid wrote:
Thanks all for your help.
Now, the story gets even more funny: They claim to have used PGP split-key,
then encrypted the files with a randomized key, then encrypted the key with
individual keys.
So far so bad. But now comes the best: They
Is this a movie?
lol... worse: it is reality. I hope I'll be able to post the docs one day
soon...
--
GMX DSL Doppel-Flat ab 19,99 Euro/mtl.! Jetzt mit
gratis Handy-Flat! http://portal.gmx.net/de/go/dsl
___
Gnupg-users mailing list
On Mon, Feb 28, 2011 at 5:38 PM, Denise Schmid chinati...@gmx.ch wrote:
Thanks all for your help.
Now, the story gets even more funny: They claim to have used PGP split-key,
then encrypted the files with a randomized key, then encrypted the key with
individual keys.
So far so bad. But now
Hello list,
first of all: Sorry if my question reaches the wrong list, but I have a
question someone on this list may probably answer easily.
If a company has shared keys: How does encryption work then? Are several owners
of a share needed to encrypt data? I just try to find out how it works
On Feb 27, 2011, at 8:25 PM, Denise Schmid wrote:
Hello list,
first of all: Sorry if my question reaches the wrong list, but I have a
question someone on this list may probably answer easily.
If a company has shared keys: How does encryption work then? Are several
owners of a share
It depends on what you mean by a shared key. There is just giving a
copy of the key to multiple people (in which case any one of them can use it),
or there are various key splitting algorithms where a key is broken into a
number of pieces, and a specified subset of those pieces can come
11 matches
Mail list logo