Re: Additional self-signature

2005-05-26 Thread David Shaw
On Fri, May 27, 2005 at 02:07:27AM +0300, Oskar L. wrote: > Werner wrote: > > When importing a secret key into a keyring without a public key, a > > public key is created from the secret key. Due to historic reasons > > the self-signature on the secret key is a different one than the one > > creat

Re: Additional self-signature

2005-05-26 Thread Oskar L.
Werner wrote: > When importing a secret key into a keyring without a public key, a > public key is created from the secret key. Due to historic reasons > the self-signature on the secret key is a different one than the one > created with the public key. How when importing the public key a new > s

Re: PGP 8.1 message

2005-05-26 Thread Sean C.
Perhaps the problem is that the sender is enclosing the public key block in an inline signed portion of the email. When that happens the sending system will modify the headers of the block by adding a hyphen and space "- " before the other dashes. e.g.: - -BEGIN PGP PUBLIC KEY BLOCK- Commen

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Alex Mauer
Mark H. Wood wrote: > The whole point of using a hash is to make it extremely unlikely that > either party could recover the plaintext unilaterally. It's like having a > vault with two different locks, and giving the keys to two different > people, to make abuse more difficult by requiring collusi

PGP 8.1 message

2005-05-26 Thread Sohail Mamdani
Hello, I am having some problems with messages and keys created/encrypted using PGP 8.1. I was, for example, sent a public key block exported from PGP 8.1 and gnupg refused to import that key into my keyring, giving me the message "gpg: no valid OpenPGP data found". I had to install PGP 9.0, impor

Choice of Algorithm

2005-05-26 Thread Youssef Aoun
Hello everyone, How should I choose an algorithm for my key. Since ElGamal is able to make signatures and encryption... why do we have other alternatives? Does it help to have multiple key?? Sincerely yours Youssef Aoun ___ Gnupg-users mailing list Gn

Re: Filesystem Encrytion with GnuPG ?!

2005-05-26 Thread Atom Smasher
speaking of encrypted file-systems, does anyone know what happened to rubberhose.org? -- ...atom _ PGP key - http://atom.smasher.org/pgp.txt 762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808 -

Re: Filesystem Encrytion with GnuPG ?!

2005-05-26 Thread C. D. Rok
Markus Breitländer wrote: is it possible to use GnuPG for filesystem encryption? I am thinking about having a directory tree o your hard disk that is encrypted using GnuPG PKI - only accessible with once secret-key + mantra. Are there solutions like that for Windows? I read about implementations

Re: Minnesota court takes dim view of encryption

2005-05-26 Thread Atom Smasher
On Thu, 26 May 2005, Erpo wrote: Cryptographic capabilities must be integrated into every popular OS and application in such a way as to make it automatic and easy to encrypt everything, no matter how mundane, from IMs to downloaded device drivers. Once everyone is doing it, the people who rea

RE: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Ryan Malayter
[Alex L. Mauer] > Can you expand on this? > > How could the Name/address/ssn be retrieved from a hash of the same? > The data can be recovered from the hash because search space is small. Say you are looking for the SSN of a John Smith. Every large DB is bound to have someone named John Smith.

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Mark H. Wood
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, 25 May 2005, Alex L. Mauer wrote: > Florian Weimer wrote: > > * Sean C.: > >>The I.B.M. software would convert data on a person into a string of > >>seemingly > >>random characters, using a technique known as a one-way hash function. No > >>na

RC2

2005-05-26 Thread Alexander Hoffmann
Hi Johan, you may be right. I tried it with ./configure --enable-ciphers="aes,...,rfc2268" und after that found in Makefile rfc2268 among the algorithms to be compiled, but after installation rfc2268 is still missed in output "libgcrypt-config --algorithms" Johan Wevers wrote: >> Alexander Hoffm

RC2

2005-05-26 Thread Alexander Hoffmann
Hello, i don't know if it is the best place to ask this type of questions, but if i'm wrong here could you tell me a right mailing list fot it. I want to decrypt rrc2 encrypted mails and use libgcrypt for this purpose. As i know the RC2 algorithm is implemented in libgcrypt (rfc2268.c), but it wil

Re: Feature request: Add date and time to filename of encrypted file

2005-05-26 Thread Henry Hertz Hobbit
On Tue, 2005-05-24 at 21:07 +0930, Roscoe wrote: > Hmmm, out of curiosity did you intend to send that to the list? Nope. And although I am sending this one to the list, it is for PRIVATE distribution and discussion only. I don't think it is of general interest. Then again, I could be wrong...it

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Michael B. Trausch
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Sean C. wrote: > > I'm confused though. > I just read this article from the New York Times. As a newbie to encryption > and > hash algorithms I thought the idea behind hashes was that you couldn't > reconstruct the data from the hash. > You ca

Re: KMail and smartcard - what is a "stub" secret key ?

2005-05-26 Thread gpg . 20 . subu
Hi I'm new here Sorry to butt in > >For gpg it makes no difference whether the key is on the disk or on >the card. This is because we create a "stub"- secret key for every >card key. gpg -K will show you the serial number of the cards >associated with that secret key. > what is a "stub" s

Choice of Algorithm

2005-05-26 Thread Youssef Aoun
Hello everyone, How should I choose an algorithm for my key. Since ElGamal is able to make signatures and encryption... why do we have other alternatives? Does it help to have multiple key?? Sincerely yours Youssef Aoun ___ Gnupg-users mailing list Gnu

Re: Minnesota court takes dim view of encryption

2005-05-26 Thread Henry Hertz Hobbit
--- Shatadal <[EMAIL PROTECTED]> wrote: > From > http://news.com.com/Minnesota+court+takes+dim+view+of +encryption/2100-1030_3-5718978.html > > "A Minnesota appeals court has ruled that the > presence of encryption software on a computer may be > viewed as evidence of criminal intent." > Then I

Re: Minnesota court takes dim view of encryption

2005-05-26 Thread Erpo
On Wed, 2005-05-25 at 16:11 -0500, Shatadal wrote: > From > http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html > > "A Minnesota appeals court has ruled that the presence of encryption > software on a computer may be viewed as evidence of criminal intent." Th

Filesystem Encrytion with GnuPG ?!

2005-05-26 Thread Markus Breitländer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey, is it possible to use GnuPG for filesystem encryption? I am thinking about having a directory tree o your hard disk that is encrypted using GnuPG PKI - only accessible with once secret-key + mantra. Are there solutions like that for Windows? I re