Re: Key Revocation

2007-04-20 Thread David Shaw
On Fri, Apr 20, 2007 at 10:40:19PM -0500, Chris wrote:

> I 'assume' at the "Command>" prompt I'd enter adduid and my new
> embarqmail.com address.

Yes.

> Once that is done, in order to make it the primary key would I then
> have to again run gpg --edit-key and my new uid and at the Command>
> prompt enter primary?

This will work, but you don't actually have to do it.  The most
recently added user ID is automatically treated as the primary if
there is no primary set.  If you want to set it anyway, just select
the new uid ("uid 1") and enter "primary".

> If I understand this right I'll still be using the same key only
> with a different address. Since I've now, hopefully, made my embarq
> address my primary is it just a simple matter of exporting this to
> the keyservers?  Then later down the road when I'm sure that all
> mailing lists and so forth have changed to the new address I just
> run all the above and at the Command> prompt run revuid
> [EMAIL PROTECTED]

You select the user id with "uid x" where x is the number of the user
ID.  Then "revuid".

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Revocation

2007-04-20 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Chris wrote:

> I'll be changing over to my new email address tomorrow so I want to make sure 
> I understand the procedure. According to the manpage I want to run $gpg 
> --edit-key [EMAIL PROTECTED] I'm then presented with this info:
> 
> [EMAIL PROTECTED] ~]$ gpg --edit-key [EMAIL PROTECTED]
> gpg (GnuPG) 1.4.6; Copyright (C) 2006 Free Software Foundation, Inc.
> This program comes with ABSOLUTELY NO WARRANTY.
> This is free software, and you are welcome to redistribute it
> under certain conditions. See the file COPYING for details.
> 
> Secret key is available.
> 
> pub  1024D/98E6705C  created: 2005-11-23  expires: never   usage: SCA
>  trust: ultimate  validity: ultimate
> 
> Command>
> 
> I 'assume' at the "Command>" prompt I'd enter adduid and my new 
> embarqmail.com 
> address. Once that is done, in order to make it the primary key would I then 
> have to again run gpg --edit-key and my new uid and at the Command> prompt 
> enter primary? If I understand this right I'll still be using the same key 
> only with a different address. Since I've now, hopefully, made my embarq 
> address my primary is it just a simple matter of exporting this to the 
> keyservers?  Then later down the road when I'm sure that all mailing lists 
> and so forth have changed to the new address I just run all the above and at 
> the Command> prompt run revuid [EMAIL PROTECTED]  Please let me know if 
> I've got something wrong in the way I understand this.

Just type "adduid" (w/o quotes) then follow the prompts to Enter the
Name; Comment & Email Address.  For "Comment" You may either leave it
blank or put whatever.  You might wish to use this to say:  New Email
Address

Whatever is in the Comment field here will have no effect upon the Key.
 It is for informational purposes only; but remember, it *cannot* be
changed or Deleted in the future without re-creating another UID!

You will then be prompted to Enter the Passphrase and then be returned
to the Command Prompt.  At this time Your Key will be showing _both_
UID's.  You may then either type "save" and be done or; type "2" and see
the asterisk appear next to the New UID.  Then type "primary" and change
the New UID to the Primary UID at this time.  Then type "save" and have
it all done at one time.

Later, You can decide whether or not You wish to Revoke the Old UID or
simply Disable it.  Opinions will vary and I won't suggest either one.

Just remember to ignore the quotes I've placed around the commands I
listed above. :)

JOHN ;)
Timestamp: Saturday 21 Apr 2007, 00:11  --400 (Eastern Daylight Time)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8-svn4485: (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: http://www.gswot.org
Comment: My Homepage:  http://tinyurl.com/yzhbhx

iQEcBAEBCgAGBQJGKY8lAAoJEBCGy9eAtCsPvZgH/jk/VRsS7sSoSJTJv1OZdQMS
IFI3VXoTkaozFbcxkKWYwFhv3cwTUM98h99Q5namr0rLJG0K/vEU8jlLvHUjlDCW
jLvQv6ryqsg+PdjdxdqmyMujYKlaVwBchR23/jiCLblp9POU1yqstefMIOlm7aeO
Zdd/JOzyCjsfSBQrdzWlRFIVt3LMIYn1pT0gg7ghjdogBjMgBiNV/b2jXYq9EKLr
UizD6+oGxzyWDtAAWmAaPtuXUSt2ZbIs5ydbFB0eYUTL6MqpDZPsQXZMYDUgKJcO
KA741eo/FyoJDoJqZnHTlPBfexHs8qA6IEmqRoVtKRfTmB3wB1AbdhRyFT1ts/M=
=N33i
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Revocation

2007-04-20 Thread Chris
On Friday 13 April 2007 11:36 pm, John Clizbe wrote:
> Chris wrote:
> > This may sound simple, but I want to make sure I get it done right. My
> > ISP/DSL provider, Embarq, has dumped Earthlink as their mail provider
> > sine 9 April and setup their own mail servers. Simple, revoke the EL key
> > and make a new key for Embarq, except, the two have come to an agreement
> > and that is that Earthlink will continue to forward mail for Embarq users
> > until 31 Oct. Question being do I keep the Earthlink key and also
> > generate one for my Embarq address or once I have everything setup for
> > the Embarq servers generate one for Embarq and at that time reovke the
> > Earthlink key?
>
> Why revoke and create a new key? Why not just add the new address on a new
> UID, and make it primary. Sometime between now and Oct 31, you can revoke
> the old UID.
>
> My AT&T address became Comcast; that became Roadrunner.
>
> Same person. Same key. Just a new email address. Plus the revoked address
> gives clueful folks the hint that email shouldn't be sent there.

I'll be changing over to my new email address tomorrow so I want to make sure 
I understand the procedure. According to the manpage I want to run $gpg 
--edit-key [EMAIL PROTECTED] I'm then presented with this info:

[EMAIL PROTECTED] ~]$ gpg --edit-key [EMAIL PROTECTED]
gpg (GnuPG) 1.4.6; Copyright (C) 2006 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Secret key is available.

pub  1024D/98E6705C  created: 2005-11-23  expires: never   usage: SCA
 trust: ultimate  validity: ultimate

Command>

I 'assume' at the "Command>" prompt I'd enter adduid and my new embarqmail.com 
address. Once that is done, in order to make it the primary key would I then 
have to again run gpg --edit-key and my new uid and at the Command> prompt 
enter primary? If I understand this right I'll still be using the same key 
only with a different address. Since I've now, hopefully, made my embarq 
address my primary is it just a simple matter of exporting this to the 
keyservers?  Then later down the road when I'm sure that all mailing lists 
and so forth have changed to the new address I just run all the above and at 
the Command> prompt run revuid [EMAIL PROTECTED]  Please let me know if 
I've got something wrong in the way I understand this.

Thanks
Chris

-- 
Chris
KeyID 0xE372A7DA98E6705C


pgp3Eqn3ExQXa.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Movies that get it right

2007-04-20 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Robert J. Hansen wrote:

> And while we're handing out movie recommendations, try for a 1974  
> Francis Ford Coppola movie called "The Conversation".  Easily the  
> best fictional movie I've ever seen about real-world communications  
> security.

Actually, "The Conversation" is a lovely real world example of why
SIGINT without HUMINT is an inferior intelligence gathering operation.
Machines will never totally replace the Human Brain.  Relying sole upon
Intercepts definitely lead to a bad conclusion for the Character played
by Gene Hackman.

One time pads, while theoretically perfect, are most vulnerable to
"Man-in-the-Middle" attacks.  Research the damage the Walker's did to US
Naval Communications.

JOHN ;)
Timestamp: Friday 20 Apr 2007, 16:28  --400 (Eastern Daylight Time)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8-svn4485: (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: http://www.gswot.org
Comment: My Homepage:  http://tinyurl.com/yzhbhx

iQEcBAEBCgAGBQJGKSJZAAoJEBCGy9eAtCsPQ/EH/jNkkCbo567Udxh/kallkDFn
spcUi0KuN4M78zcYbu5Gc+lmymP76kNqHLJZC3IMEg6gyUrtoS791wZrznWbf6D7
MWA/EYWYnbPTLI9iUyLZhX5P4T3O5AC5mktMEmjpcF/3Pp5k2bdYce5Bm8/Z9QDW
8QcApkvzab147deTJBVqWrTF58WeES5GeigHQPIiLjRR7tTY9D7FLy4BUnF/PV5p
3I5Yxv7ENHQtM0nd+PhFlaHOP88jqDDXFV1C3af4TAMSzCbMrLpavqi/3oIx5NkH
jpH9X1YSnG5DX/2KCPsZRZX0Y72AlyqD7Sn1r3YZcrhEURjjScP1s9HFMvMKYbI=
=NXoW
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Movies that get it right

2007-04-20 Thread Robert J. Hansen
> OpenPGP and GPG is about making the idea-based mathematic apparatus
> suited to survive in the real world. If you want to see what it takes,
> find a movie called "In ascolto" or "The Listening" (it was shot in
> Italy by Italians, and was released both in Italian and English), it
> is a somewhat loose on technical side, but shows the difference
> between mathematical/theoretical and real life security. P2P file
> details on (encrypted) request.

And while we're handing out movie recommendations, try for a 1974  
Francis Ford Coppola movie called "The Conversation".  Easily the  
best fictional movie I've ever seen about real-world communications  
security.

Phil Alden Robinson's 1992 movie "Sneakers" is also appropriate here,  
although "Sneakers" is a little inferior to "The Conversation".

Both those movies are absolutely brilliant when it comes to the  
subject of communications security.

http://www.imdb.com/title/tt0071360/
http://www.imdb.com/title/tt0105435/



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Janusz A. Urbanowicz
On Fri, Apr 20, 2007 at 01:57:46PM +0200, Anders Breindahl wrote:

> Saying that ``there is no such thing'' seems harsh and as if you ignore
> reality. The European Union put its hopes up for implementing a
> ``quantum cryptography'' network of communications. That sort of makes
> the term real in itself.

This is because they are a governement and gov't usually wants to have
super secure comm network for gov't super secret communication.
 
> However, quantum cryptography does have that nice inherent benefit, that
> it _can't_ be eavesdropped, according to said article. That is, after
> authenticity has been established and the line has been paid for:

It can be eavesdropped, but it is impossible to intercept information
that way and the eavesdropping is detectable. Or rather should be:
eavesdropping on QC link is detectable if by rule single photons are
used as transmission units. This is because there's no way to
intercept a photon and reinject it without destroying its quantum
state. However, in commercial installations pulses (batches of
photons) are used, so its perfectly possible to intercept a piece of
the pulse. My quantum-fu is too weak to really know if this makes the
eavesdropping undetectable, but the intuition says that yes.

> I suppose that this is the feature that got the European Union's
> attention.

EU is know for sinking money in very bizarre projects.

> But the attractive part of focusing on the mathematical aspects are that
> -- if provable -- it could give some guarantee ( > reassurance)
> of the unbreakability of the ciphers out there.
> 
> You may not be interested in that, but I am. I too however neither will
> end up a mathematician whose life is focused on solving some single
> problem.
> 
> But I would be interested in the result. I could pick the cipher that
> provably could withstand any battering thinkable over the cipher that
> perhaps couldn't.

But the point is that the ciphers live in the real world and in the
real world it is much easier to do HUMINT (like "ale and whores"
mentioned before, or rubberhose cryptanalysis) instead of trying to
break the mathematically unbreakable. Be it provably unbreakable or
not.

OpenPGP and GPG is about making the idea-based mathematic apparatus
suited to survive in the real world. If you want to see what it takes,
find a movie called "In ascolto" or "The Listening" (it was shot in
Italy by Italians, and was released both in Italian and English), it
is a somewhat loose on technical side, but shows the difference
between mathematical/theoretical and real life security. P2P file
details on (encrypted) request.

Alex
-- 
JID: [EMAIL PROTECTED]
PGP: 0x46399138
od zwracania uwagi na detale są lekarze, adwokaci, programiści i zegarmistrze
 -- Czerski

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

> Yeah, again. I completely agree on the practical aspect of it, but  
> would
> nevertheless like to see proofs of complexity that weren't  
> dependent on
> the current models of computations.

I don't mean to sound flip, but as soon as you invent a hypercomputer  
I would love to revisit this issue with you.  For now, all our  
computational theoretic proofs will be limited by the the lambda  
calculus.  I don't mean to sound blunt there, but our current model  
of computation is extraordinarily robust, and there are very strong  
arguments that hypercomputation is both physically and mathematically  
impossible.  (If any problem in UNDECIDABLE can be solved by an  
oracle, then math goes from incomplete and inconsistent straight into  
pervasively self-contradictory and broken.  That's the rationale for  
hypercomputation being physically and mathematically impossible.)

> I was referring to the subject that is mentioned on the Wikipedia  
> page:
> http://en.wikipedia.org/wiki/Quantum_cryptography

Wikipedia is not an authoritative reference.

"Quantum cryptography" is a nice catchphrase.  I'm unaware of any  
respected authority in the field of crypto who takes the phrase  
seriously.

The phrase is used in nontechnical media, and in that environment its  
usage is probably defensible.  After all, people reading the  
newspaper don't want to be bothered with the details of what QKE is  
all about.  But we're trying to be precise here, and for that reason,  
let's not talk about quantum cryptography.  Let's be precise and talk  
about QKE.

> Contrary to one time pads, which are provably secure -- where  
> ``secure''
> means ``unbreakable from theoretical standpoint, but with no thought
> given to practical limits''.
>
> I was told that one time pads were also used by the KGB, by the way.
> Mini-books whose pages were to be burned after using.

The NSA was breaking the KGB's one-time pads.  Look into Project  
VENONA.  Soviet cipher clerks were making technical errors in using  
their one-time pads and the NSA was able to start reading their traffic.

So yeah, I'm not sure why you want flawless perfect proofs of  
security when reality shows that provably secure systems never are.

> Though it sounds sweet, it's beyond the scope of cryptography to  
> ensure
> such protection (to some extent, though, security should limit room  
> for
> personnel ``breakage'').

It's beyond the realm of mathematical cryptography, but not the field  
as a whole.

My day job involves security analysis of electronic voting machines  
for the National Science Foundation [*].  We spend far, far more time  
scrutinizing the human side of the cryptography than the mathematical  
side.  Probably an order of magnitude.




[*] I'm not speaking for the NSF here, obviously, I'm completely  
responsible for any errors I make, etc., etc.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (Darwin)

iQEcBAEBCgAGBQJGKOavAAoJELcA9IL+r4EJ0cUIAKtWkRqLLXEfUfUzGmCTLXep
rsaxL2M3pBooQ9IIrnaTqKJxGkwyctYELZj94q+qcO+UZQ63HQGs7cslK7o1/Wyl
lN23aBlio7lABDT+jqyZYg2RWj2Urb6TKpYdTqsKiYM7MA2oxLpvIw9ear5s3Nxe
33uGKb5S3rZzjoYPgz35KXaqX7Qq9STbXFkiP70PsA8CazYXo3F9Tlqa+/n2/Wwf
Ti18Ga3DVjQoFx3uuU2U/+99gAQKrU9f6J6Q0N4WDFJO3Elst+7eCB89FEuoQYOl
iM2/bxTvJ+2/Uk022b++nlc7agtgMtJaVTsec7mbDqyaNinD5BR3jQgRl3oG7E8=
=p91A
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pinentry - Impossible to disable/ignore if present?

2007-04-20 Thread Jules Colding
On Fri, 2007-04-20 at 16:18 +0200, Werner Koch wrote:
> On Fri, 20 Apr 2007 15:34, [EMAIL PROTECTED] said:
> 
> > So even if I prevent pinentry to show up it will eventually be
> > impossible for me to provide my own callback function?
> 
> I don't understand this.  It is in general useless to tell gpg-agent not
> to use pinentry for a desktop machine.  For a server you want to use
> gpg-preset-passpharse or - better - use no passphrase at all.

OK, a little background information is in order here I think :-)

I've created a little utility daemon(*) implementing a small and very
simple keyring. The idea is that the keyring is given a master
passphrase to unlock it's content and to encrypt new content. The
content of the keyring is generally passwords.

I'm using gpgme for the encryption and decryption of those passwords.

I've therefore implemented a daemon that holds the master passphrase and
hands it over to the gpgme framework by the use of the passphrase
callback function gpgme_set_passphrase_cb().

Having pinentry pop up whenever my callback function should be invoked
will therefore prevent the correct passphrase from being handed over to
gpgme. I'm using my own little gtk+ dialog to query the master
passphrase and content passwords from the user. 

Maybe I could do this differently but I really want the passphrase
dialog to look exactly like the one being used by Evolution so using
pinentry-gtk-2 is sub-optimal.

Any ideas on how I can:

1) make gpgme use my own callback passphrase function or,

2) make gpgme always use pinentry but using a custom dialog title and
question text

?? 

> > Will this also hold true if I use libgcrypt instead?
> 
> Libgcrypt is a low-level library without any relation to OpenPGP or
> S/MIME.  It is much like libc.

Looks like I need to use it if I can't prevent gpgme from launching
pinentry. The drawback is a lack of sample code using libgcrypt. Any
samples out there doing encryption from a small memory buffer to a file
and decrypting the other way?

Thanks a lot in advance,
  jules


(*) Full source is here:

http://www.omesc.com/content/downloads/dist/testing/brutus-snapshot.tar.bz2

Look in  for the
keyring source. A small test program is in <../keyring-test/>.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Key signing parties

2007-04-20 Thread Bruno Costacurta
Hello,

are there some mailing list / blog / ..others.. where are mentioned key 
signing parties ?

I expected to find something at
http://www.gnupg.org/
but it seems this site does not contain any info about such parties.

Thanks for attention.
Bye,
Bruno

-- 
PGP key ID: 0x2e604d51
Key : http://www.costacurta.org/keys/bruno_costacurta_pgp_key.html
Key fingerprint = 713F 7956 9441 7DEF 58ED  1951 7E07 569B 2E60 4D51
--


pgpKRb8p2RSWs.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key signing parties

2007-04-20 Thread David Shaw
On Fri, Apr 20, 2007 at 02:25:48PM +0200, Bruno Costacurta wrote:
> Hello,
> 
> are there some mailing list / blog / ..others.. where are mentioned key 
> signing parties ?
> 
> I expected to find something at
> http://www.gnupg.org/
> but it seems this site does not contain any info about such parties.

Go to http://www.biglumber.com

It's the perfect site for setting up and finding key signing
gatherings as well as individual signature exchanges.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pinentry - Impossible to disable/ignore if present?

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 15:34, [EMAIL PROTECTED] said:

> So even if I prevent pinentry to show up it will eventually be
> impossible for me to provide my own callback function?

I don't understand this.  It is in general useless to tell gpg-agent not
to use pinentry for a desktop machine.  For a server you want to use
gpg-preset-passpharse or - better - use no passphrase at all.

> Will this also hold true if I use libgcrypt instead?

Libgcrypt is a low-level library without any relation to OpenPGP or
S/MIME.  It is much like libc.


Shalom-Salam,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm --sign with smartcard?

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 15:14, [EMAIL PROTECTED] said:

> Neat, although I had to manually create the trustlist.txt file first.

Already fixed in SVN - guess I should do a new release.


Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pinentry - Impossible to disable/ignore if present?

2007-04-20 Thread Jules Colding
On Fri, 2007-04-20 at 15:06 +0200, Werner Koch wrote:
> On Fri, 20 Apr 2007 14:22, [EMAIL PROTECTED] said:
> 
> > I find that pinentry unconditionally is being launched whenever I
> > attempt to encrypt or decrypt something using gpgme. 
> 
> Depends.  With gpg 1.4 you need to use --use-agent.  But if you are
> using gpg2 the gpg-agent is required and you won't see a passphrase
> callback.  That is so that we eventually can move all secret key
> processing into gpg-agent.

So even if I prevent pinentry to show up it will eventually be
impossible for me to provide my own callback function?

Will this also hold true if I use libgcrypt instead?

Thanks,
  jules




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenGPG card indifferent places ?

2007-04-20 Thread Sven Radde
Matthias Barmeier schrieb:
> I tried to investigate what the URL should look like, but I cannot find
> an example.
> Could you give me some pointers or hints howto form this URL ?

Just tried it out to get a quick HOWTO:

Export your key, upload it to some webserver (not keyserver) and note
the URL, e.g., http://example.com/mb.asc.

Then put the OpenPGP card into the reader, run "gpg --card-edit" "admin"
"url", enter the URL, enter the admin PIN, then "quit".
On the machine you want to set-up, insert the card, run "gpg
--card-edit" "fetch" "verify" enter the normal PIN and then "quit".

The "verify" will create the secret key stub (probably there are other
ways to invoke this) and "fetch" will download the corresponding public
key from the web.

Try "gpg --list-keys" and "gpg --list-secret-keys" and "gpg
--card-status" to check that all keys are where they belong.


HTH, Sven

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pinentry - Impossible to disable/ignore if present?

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 14:22, [EMAIL PROTECTED] said:

> I find that pinentry unconditionally is being launched whenever I
> attempt to encrypt or decrypt something using gpgme. 

Depends.  With gpg 1.4 you need to use --use-agent.  But if you are
using gpg2 the gpg-agent is required and you won't see a passphrase
callback.  That is so that we eventually can move all secret key
processing into gpg-agent.

Shalom-Salam,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Scdaemon READCERT

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 14:14, [EMAIL PROTECTED] said:

> Does this command work?  I see that Scute does not use gpg-agent or
> scdaemon to get the certificates, but it invokes 'gpgsm --server' and
> uses DUMPKEYS.  That works, but I'd rather talk to only gpg-agent and
> not also gpgsm in GnuTLS.

gpg-agent does not know about any protocol so there is no way to tell it
to read an X.509 cetificate.  However, most X.509 smartcards store a
certificate and thus there is a need to allow reading it from a card.
This is the reasons why Scdaemon features the

> SCD READCERT 26D864C468935011B59E4F297E4B82FA34355BCC
> ERR 100663420 Unsupported operation 

command.  The OpenPGP card does not store certificates and thus this
operation is not supported for this card.  Although it is named OpenPGP
it is not exactly an OpenPGP card but designed to allow easy working
with OpenPGP by storing an OpenPGP fingerprint and the creation time of
the key.

If you use a X.509 card you might get this

  $ gpg-connect-agent --hex
  scd learn --force
  S SERIALNO D27600 0
  S APPTYPE DINSIG
  S CERTINFO 101 DINSIG.C000
  S KEYPAIRINFO 6F673AD2374E2F427634EF2BB4798092B751981E DINSIG.C000
  scd readcert DINSIG.C000
  D[]  30 82 05 01 30 82 03 E9  A0 03 02 01 02 02 03 00   0...0...
  D[0010]  99 AD 30 25 30 44 06 09  2A 86 48 86 F7 25 30 44   ..0%0D..*.H..%0D
  D[0020]  01 01 05 05 00 30 6C 31  0B 30 09 06 03 55 04 06   .0l1.0...U..
  D[0030]  13 02 44 45 31 15 30 13  06 03 55 04 25 30 41 0C   ..DE1.0...U.%0A.
  D[0040]  0C 44 2D 54 72 75 73 74  20 47 6D 62 48 31 22 30   .D-Trust GmbH1"0
  D[0050]  20 06 03 55 04 03 0C 19  44 2D 54 52 55 53 54 20..UD-TRUST 
  [...]
  D[0150]  77 71 7A D0 97 wqz..   
  OK

I now that this is a bit annoying but required to keep the design clean.


Shalom-Salam,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm --sign with smartcard?

2007-04-20 Thread Simon Josefsson
Werner Koch <[EMAIL PROTECTED]> writes:

> On Fri, 20 Apr 2007 14:03, [EMAIL PROTECTED] said:
>
>> Use --disable-crl-checks to disable CRL checks.  Also, you must put
>> the CA fingerprint in your trustlist.txt:
>
> Or use --allow-mark-trusted in gpg-agent.conf so that the agent will ask
> you whether to put it into trustlist.txt.

Neat, although I had to manually create the trustlist.txt file first.
Otherwise I get:

[EMAIL PROTECTED]:~$ echo foo|gpgsm --sign --disable-crl-checks -a
gpgsm: checking the trust list failed: No such file or directory
gpgsm: error creating signature: No such file or directory 
[EMAIL PROTECTED]:~$

Maybe gpg-agent could create trustlist.txt if it doesn't exist, if
allow-mark-trusted is used?

/Simon

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


pinentry - Impossible to disable/ignore if present?

2007-04-20 Thread Jules Colding
Hi,

I find that pinentry unconditionally is being launched whenever I
attempt to encrypt or decrypt something using gpgme. 

I've checked that the callback function is being set correctly using a
combination of gpgme_set_passphrase_cb() and gpgme_get_passphrase_cb().

Unfortunately this is totally ignored by the underlying GnuPG framework
and pinentry is unconditionally launched to query for a passphrase. My
private passphrase callback function is never invoked.

Any ideas?

Thanks,
  jules
 



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm --sign with smartcard?

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 14:03, [EMAIL PROTECTED] said:

> Use --disable-crl-checks to disable CRL checks.  Also, you must put
> the CA fingerprint in your trustlist.txt:

Or use --allow-mark-trusted in gpg-agent.conf so that the agent will ask
you whether to put it into trustlist.txt.


Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm --sign with smartcard?

2007-04-20 Thread Simon Josefsson
Simon Josefsson <[EMAIL PROTECTED]> writes:

> I'm trying to sign something using gpgsm and a smartcard, but here is
> what happens:
...
> Where do I put the CRL that will be checked?
>
> Alternatively, how can I tell gpgsm/dirmngr to not check any CRL?

I solved this myself, sorry for the noise.

For the record:

Use --disable-crl-checks to disable CRL checks.  Also, you must put
the CA fingerprint in your trustlist.txt:

[EMAIL PROTECTED]:~$ cat /home/jas/.gnupg/trustlist.txt
15:32:B4:BA:5A:8A:79:88:CA:26:42:83:59:1B:A3:A2:1C:0B:CC:24 S
[EMAIL PROTECTED]:~$

Then signing works:

[EMAIL PROTECTED]:~$ echo foo | gpgsm --sign -u 
BD:5F:80:DE:63:03:4E:C9:E2:84:1E:63:09:55:2E:34:5C:5F:22:6F 
--disable-crl-checks > foo
gpgsm: CRLs not checked due to --disable-crl-checks option
gpgsm: DBG: adding certificates at level 1
gpgsm: signature created
[EMAIL PROTECTED]:~$

I can't parse the output using GnuTLS 'certtool', but OpenSSL appears
to handle it, so I suppose it may be a bug in GnuTLS.

/Simon

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenGPG card indifferent places ?

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 12:07, [EMAIL PROTECTED] said:

> I tried to investigate what the URL should look like, but I cannot find
> an example.
> Could you give me some pointers or hints howto form this URL ?

 http://myhome.foo/mykey.asc

is a good choice.  I consider it a good idea to have one's own key on
some public location anyway and not to rely just on keyservers.  See my
OpenPGP mail header for another example.

If you have not stored that URL on the card you can also use

  gpg --fetch-key http://myhome.foo/mykey.asc



Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Scdaemon READCERT

2007-04-20 Thread Simon Josefsson
Does this command work?  I see that Scute does not use gpg-agent or
scdaemon to get the certificates, but it invokes 'gpgsm --server' and
uses DUMPKEYS.  That works, but I'd rather talk to only gpg-agent and
not also gpgsm in GnuTLS.

This is what I tried:

[EMAIL PROTECTED]:~$ gpg-connect-agent
SCD LEARN --force
S SERIALNO D27600012401010100010532 0
S APPTYPE OPENPGP
S EXTCAP gc=1+ki=1+fc=1+pd=1
S DISP-NAME Key<
SCD READCERT OPENPGP.3
ERR 100663420 Unsupported operation 

/Simon

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpgsm --sign with smartcard?

2007-04-20 Thread Simon Josefsson
I'm trying to sign something using gpgsm and a smartcard, but here is
what happens:

[EMAIL PROTECTED]:~$ gpgsm --sign -u 
BD:5F:80:DE:63:03:4E:C9:E2:84:1E:63:09:55:2E:34:5C:5F:22:6F
dirmngr[21860]: error opening `/home/jas/.gnupg/dirmngr_ldapservers.conf': No 
such file or directory
dirmngr[21860]: permanently loaded certificates: 0
dirmngr[21860]: runtime cached certificates: 0
dirmngr[21860]: no CRL available for issuer id 
73504958EC804B0DA5501605CFEC58754F0864FE
dirmngr[21860]: crl_fetch via issuer failed: Configuration error
dirmngr[21860]: command ISVALID failed: Configuration error
gpgsm: certificate #4628A165/CN=GnuTLS test CA
gpgsm: checking the CRL failed: Configuration error
gpgsm: can't sign using 
`BD:5F:80:DE:63:03:4E:C9:E2:84:1E:63:09:55:2E:34:5C:5F:22:6F': Configuration 
error
[EMAIL PROTECTED]:~$

Where do I put the CRL that will be checked?

Alternatively, how can I tell gpgsm/dirmngr to not check any CRL?

Thanks,
Simon

[EMAIL PROTECTED]:~$ gpgsm -K
/home/jas/.gnupg/pubring.kbx

Serial number: 4628A165
   Issuer: /CN=GnuTLS test CA
  Subject: /CN=Test Key/O=Simon Josefsson
  aka: (dns-name josefsson.org)
 validity: 2007-04-20 11:17:59 through 2007-10-17 11:18:02
 key type: 1024 bit RSA
key usage: digitalSignature keyEncipherment
ext key usage: clientAuth (suggested), serverAuth (suggested)
  fingerprint: BD:5F:80:DE:63:03:4E:C9:E2:84:1E:63:09:55:2E:34:5C:5F:22:6F

[EMAIL PROTECTED]:~$ gpgsm -k
/home/jas/.gnupg/pubring.kbx

Serial number: 4628A165
   Issuer: /CN=GnuTLS test CA
  Subject: /CN=Test Key/O=Simon Josefsson
  aka: (dns-name josefsson.org)
 validity: 2007-04-20 11:17:59 through 2007-10-17 11:18:02
 key type: 1024 bit RSA
key usage: digitalSignature keyEncipherment
ext key usage: clientAuth (suggested), serverAuth (suggested)
  fingerprint: BD:5F:80:DE:63:03:4E:C9:E2:84:1E:63:09:55:2E:34:5C:5F:22:6F

Serial number: 46261D27
   Issuer: /CN=GnuTLS test CA
  Subject: /CN=GnuTLS test CA
 validity: 2007-04-18 13:29:11 through 2008-04-17 13:29:11
 key type: 1024 bit RSA
key usage: certSign
 chain length: unlimited
  fingerprint: 15:32:B4:BA:5A:8A:79:88:CA:26:42:83:59:1B:A3:A2:1C:0B:CC:24

[EMAIL PROTECTED]:~$

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Anders Breindahl
[ Please interrupt if this is getting too off-topic. ]

On 200704200441, Robert J. Hansen wrote:
> Anders Breindahl wrote:
> > Well. Yeah. But the thing that was and is fascinating about cryptography
> > is that it -- assuming some model of computing -- is ``provable too
> > hard'' to bypass. I'm worried that the future holds in store revolutions
> > in computability that will shake those assumptions on ``too hard''.
> 
> I forget who said this, but it's my favorite quote about predicting the
> future.  "The future never comes to us well-ordered."  It's always
> punctuated with unpredictable advances and inexplicable delays.  You can
> either obsess over the fact that crypto is a branch of mathematics, and
> thus a human endeavor subject to the disordered-future rule, or you can
> smile and shrug and say "well, we'll do the best with what we have, and
> keep our eyes open for the future."
> 
> My best advice is to not worry about it.  :)

Yeah, again. I completely agree on the practical aspect of it, but would
nevertheless like to see proofs of complexity that weren't dependent on
the current models of computations.

However, then you'll just invent the hardware-coming-in-3050 model, that
does all its calculations by solving RSA. Or whatever I aim to defend.

> > This is in contrast to quantum cryptography, which, IINM, is provably
> 
> There is no such thing as quantum cryptography.  "Cryptography" is a
> broad term encompassing a great many subjects, and we simply don't have
> that for the quantum world.

I was referring to the subject that is mentioned on the Wikipedia page:
http://en.wikipedia.org/wiki/Quantum_cryptography

Saying that ``there is no such thing'' seems harsh and as if you ignore
reality. The European Union put its hopes up for implementing a
``quantum cryptography'' network of communications. That sort of makes
the term real in itself.

Link to that statement in Danish:
http://ing.dk/apps/pbcs.dll/article?AID=/20040826/IT/108270093

That doesn't mean that it (quantum cryptography) by any means is
practical. It would seem from Werner's forward that it's so deeply
buried in its own infancy or -- more seriously -- inherent
technicalities, that it won't find any practical use ever.

However, quantum cryptography does have that nice inherent benefit, that
it _can't_ be eavesdropped, according to said article. That is, after
authenticity has been established and the line has been paid for:
  
  http://en.wikipedia.org/wiki/Quantum_cryptography#Attacks:
  In Quantum Cryptography, traditional man-in-the-middle attacks are
  impossible due to the Observer Effect. If Mallory attempts to
  intercept the stream of photons, he will inevitably alter them. He
  cannot re-emit the photons to Bob correctly, since his measurement has
  destroyed information about the photon's full state and correlations.

I suppose that this is the feature that got the European Union's
attention.

> > Again, if I got it correctly, Rice' theorem came into a world where
> > science was occupied with proving that this and that property was
> > undecidable. Something ``like'' Rice' theorem would in a similar way
> > alter the way that the scientific field is on.
> 
> [scratches head] Are you talking about the second Hilbert problem?  That
> one generally goes to Gödel or Turing.  Rice's theorem is an interesting
> bit of work with some deep consequences for computer science, but it's
> not anywhere near as big of a shakeup as incompleteness.

Then take that for an example. My point is that proofs can alter the
heading of a scientific field in the time it takes to they're generally
accepted.

> > Both are convenient. However, the proofs that consolidate the security
> > of programs like gnupg, assume some model of computation...
> 
> What proofs?  There are none.

I was merely assuming that such proofs existed. But, when I think again,
formal proofs of correctness are hard to get, too, so why would
common cryptography be provable?

> > So what I would love to see is some proof that -- even when faced with
> > this new model of computing, ignoring its practical limitations --
> 
> Why?  Seriously.  Why?  By and large, cryptanalysis of intercepts is a
> dead issue.  Nobody with half a brain does it.

It's the you-don't-know-that-question. *Probably*, it's secure, and all
data supports it, but it hasn't been proved to be secure. Therefore,
it's restricted to being ``probably'' or ``very probably'' secure.
Right?

Contrary to one time pads, which are provably secure -- where ``secure''
means ``unbreakable from theoretical standpoint, but with no thought
given to practical limits''.

I was told that one time pads were also used by the KGB, by the way.
Mini-books whose pages were to be burned after using.

> According to the best information available, during the entire Cold War
> the KGB and GRU were never able to break a single United States cipher
> cleared for top-secret information.  That's not to say the KGB and GRU
> weren't

Re: OpenGPG card indifferent places ?

2007-04-20 Thread Matthias Barmeier
Werner Koch wrote:
> On Thu, 19 Apr 2007 23:25, [EMAIL PROTECTED] said:
>
>   
>> Ooops, just checked. Secret key on the keyring contains the stub. Export the
>> public and secret parts of the card's key and import them on your home 
>> machine.
>> 
>
> The secret key stub will be automagically created.  However itis
> required to import the public key as the card has not enough space to
> store OpenPGp keyblocks.  If the URL field of the card has been set, you
> can just give the command "fetch" in the --card-edit menu.
>   
If I understand you correctly I only have to call something like gpg
--armor --export 0x123456 > key.pub
on my office PC and somthing like gpg --import key.pub is this correct ??

I tried to investigate what the URL should look like, but I cannot find
an example.
Could you give me some pointers or hints howto form this URL ?


Thanx.

Ciao
Matthias


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Robert J. Hansen
Anders Breindahl wrote:
> Well. Yeah. But the thing that was and is fascinating about cryptography
> is that it -- assuming some model of computing -- is ``provable too
> hard'' to bypass. I'm worried that the future holds in store revolutions
> in computability that will shake those assumptions on ``too hard''.

I forget who said this, but it's my favorite quote about predicting the
future.  "The future never comes to us well-ordered."  It's always
punctuated with unpredictable advances and inexplicable delays.  You can
either obsess over the fact that crypto is a branch of mathematics, and
thus a human endeavor subject to the disordered-future rule, or you can
smile and shrug and say "well, we'll do the best with what we have, and
keep our eyes open for the future."

My best advice is to not worry about it.  :)

> This is in contrast to quantum cryptography, which, IINM, is provably

There is no such thing as quantum cryptography.  "Cryptography" is a
broad term encompassing a great many subjects, and we simply don't have
that for the quantum world.

Quantum key exchange is an interesting trick of physics.  But that's all
"quantum cryptography" is at this point--a simple key exchange
algorithm.  There are no quantum encryption algorithms, no quantum
signature schemes, no quantum hash functions.  Just quantum key
exchange... which is nowhere near as cool as people make it out to be.

It's an interesting parlor trick.  It's not anything new in the world of
crypto.

> Again, if I got it correctly, Rice' theorem came into a world where
> science was occupied with proving that this and that property was
> undecidable. Something ``like'' Rice' theorem would in a similar way
> alter the way that the scientific field is on.

[scratches head] Are you talking about the second Hilbert problem?  That
one generally goes to Gödel or Turing.  Rice's theorem is an interesting
bit of work with some deep consequences for computer science, but it's
not anywhere near as big of a shakeup as incompleteness.

> Both are convenient. However, the proofs that consolidate the security
> of programs like gnupg, assume some model of computation...

What proofs?  There are none.  There are just lines of reasoning which
we believe to have substantial weight, but nobody has delivered an
actual proof of security for any cipher or hash.  To do so you'd have to
prove P != NP, and that's one of the Holy Grails of CompSci.

Look at something as simple as RSA.  There are three major conjectures
that go into RSA.

1.  The RSA problem (RSAP) is equivalent to the integer
factorization problem.

2.  The Integer Factorization Problem is not in P.

3.  P != NP.

None of those have been proven.  None.  We like to pretend that they
have been, we like to handwave them, but the reality is those
conjectures are unproven... and, in fact, #1 is probably false.

See Boneh and Venkatesan, "Breaking RSA May Be Easier than Factoring".

http://theory.stanford.edu/~dabo/papers/no_rsa_red.pdf

> So what I would love to see is some proof that -- even when faced with
> this new model of computing, ignoring its practical limitations --

Why?  Seriously.  Why?  By and large, cryptanalysis of intercepts is a
dead issue.  Nobody with half a brain does it.

According to the best information available, during the entire Cold War
the KGB and GRU were never able to break a single United States cipher
cleared for top-secret information.  That's not to say the KGB and GRU
weren't reading top-secret cables on a regular basis.  Instead of
cryptanalyzing the traffic, they just sent expensive hookers and good
bourbon to cipher clerks in the American embassy.

There are literally thousands of ways to skin this cat.  Focusing on
purely the mathematical aspect is very shortsighted.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenGPG card indifferent places ?

2007-04-20 Thread Werner Koch
On Thu, 19 Apr 2007 23:25, [EMAIL PROTECTED] said:

> Ooops, just checked. Secret key on the keyring contains the stub. Export the
> public and secret parts of the card's key and import them on your home 
> machine.

The secret key stub will be automagically created.  However itis
required to import the public key as the card has not enough space to
store OpenPGp keyblocks.  If the URL field of the card has been set, you
can just give the command "fetch" in the --card-edit menu.


Shalom-Salam,

   Werner



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Werner Koch
On Fri, 20 Apr 2007 09:09, [EMAIL PROTECTED] said:

> This is in contrast to quantum cryptography, which, IINM, is provably
> uninterceptable (but, unlike traditional cryptography, has many
> weaknesses beyond the purely theoretical ones).

While you mention this, I can't resist to forward Perry E. Metzger's
comments:

  To: cryptography at metzdowd
  Subject: my periodic rant on quantum crypto
  From: "Perry E. Metzger" 
  Date: Mon, 12 Apr 2004 15:37:33 -0400
  
  /. is running yet another story on quantum cryptography today, with
  the usual breathless hype:
  
  http://science.slashdot.org/article.pl?sid=04/04/12/133623
  
  I'm especially unimpressed with the "Does this spell the
  end of the field of cryptography?" comment.
  
  For those who don't know much about what it is, "Quantum Cryptography"
  is a very expensive way of producing an unauthenticated link
  encryption device. It is useless for any application other than link
  encryption over a short distance and requires a dedicated optical
  fiber to work.
  
  QC has no properties that render it especially better for link
  encryption than, say, a box from one of several vendors running AES on
  the link instead. It is perhaps theoretically safer, but in practice
  no one is going to break AES either -- they're going to bribe the
  minimum wage guard at your colo to have 20 minutes alone with your box
  while they install a tap on the clear side of it (or worse, they'll
  slip in while the guard is asleep at his desk.)
  
  QC still requires link authentication (lest someone else other than
  the people you think you're talking to terminate your fiber
  instead). As a result of this, you can't really get rid of key
  management, so QC isn't going to buy you freedom from that.
  
  QC can only run over a dedicated fiber over a short run, where more
  normal mechanisms can work fine over any sort of medium -- copper, the
  PSTN, the internet, etc, and can operate without distance limitation.
  
  QC is fiendishly costly -- orders of magnitude more expensive than an
  AES based link encryption box.
  
  QC is extremely hard to test to assure there are no hardware or other
  failures -- given the key in use, I can use intercepted traffic to
  assure my AES link encryption box is working correctly, but I have no
  such mechanism for a QC box.
  
  On top of all of this, the real problems in computer security these
  days have nothing to do with stuff like how your link encryption box
  works and everything to do with stuff like buffer overflows, bad
  network architecture, etc.
  
  Given that what we're dealing with is a very limited technology that
  for a very high price will render you security that is at best not
  particularly better than what much more economical solutions will
  yield, why do people keep hyping this?  Indeed, why do people buy these
  boxes, if indeed anyone is buying them?
  
  It is stunning that a lab curiosity continues to be mentioned over
  and over again, not to mention to see venture capitalists dump money
  after it.
  
  BTW, none of this has anything to do with "Quantum Computing", which
  may indeed yield breakthroughs someday in areas such as factoring but
  which is totally unrelated...
  
  Perry




Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quantum computing

2007-04-20 Thread Anders Breindahl
On 200704191925, Robert J. Hansen wrote:
> While I agree that commercial development _may_ lead to developments  
> in QC, I think it's equally likely that the engineering difficulties  
> will be insurmountable.  Which means that, from where I sit, we  
> should just shrug and say "we really can't say with any confidence  
> what the future will or will not hold".

Well. Yeah. But the thing that was and is fascinating about cryptography
is that it -- assuming some model of computing -- is ``provable too
hard'' to bypass. I'm worried that the future holds in store revolutions
in computability that will shake those assumptions on ``too hard''.

This is in contrast to quantum cryptography, which, IINM, is provably
uninterceptable (but, unlike traditional cryptography, has many
weaknesses beyond the purely theoretical ones).


> > found -- this pragmatism causes me to ponder the scenario in which
> > something like Rice' theorem could be established for quantum  
> > computers'
> > ability (or traditional computers' inability):
> 
> What do you mean?  Rice's theorem applies to QC.

Again, if I got it correctly, Rice' theorem came into a world where
science was occupied with proving that this and that property was
undecidable. Something ``like'' Rice' theorem would in a similar way
alter the way that the scientific field is on.

> It's true that in mathematics there could always be a proof delivered  
> tomorrow by some hungry graduate student which will utterly shatter  
> our knowledge of math as we know it.  But this is true for all of  
> mathematics.  It's not as if this risk is special to QC.

I was mostly focusing on positive proofs, by which I mean those that
define what _is_ doable or assumable, rather than the negative proofs
that define what is undoable.

Both are convenient. However, the proofs that consolidate the security
of programs like gnupg, assume some model of computation... And in the
face of quantum computing, that assumption may (=has the potential to)
radically change.

So what I would love to see is some proof that -- even when faced with
this new model of computing, ignoring its practical limitations -- the
best-known attack on gnupg's algorithms takes factor ten of the lifetime
of the universe or would cost twice the energy of the sun.

Which can't be said of RSA on a huge quantum computer, if I understood
you correctly.

> You should  be just as concerned about the prospect of P=NP.

I haven't had my introductory courses in computability theory yet. I
don't know what that is, and will patiently wait for it.

Thanks for the lecture.

Regards, skrewz.


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users