On Fri, May 27, 2005 at 02:07:27AM +0300, Oskar L. wrote:
> Werner wrote:
> > When importing a secret key into a keyring without a public key, a
> > public key is created from the secret key. Due to historic reasons
> > the self-signature on the secret key is a different one than the one
> > creat
Werner wrote:
> When importing a secret key into a keyring without a public key, a
> public key is created from the secret key. Due to historic reasons
> the self-signature on the secret key is a different one than the one
> created with the public key. How when importing the public key a new
> s
Perhaps the problem is that the sender is enclosing the public key block in an
inline signed portion of the email. When that happens the sending system will
modify the headers of the block by adding a hyphen and space "- " before the
other dashes. e.g.:
- -BEGIN PGP PUBLIC KEY BLOCK-
Commen
Mark H. Wood wrote:
> The whole point of using a hash is to make it extremely unlikely that
> either party could recover the plaintext unilaterally. It's like having a
> vault with two different locks, and giving the keys to two different
> people, to make abuse more difficult by requiring collusi
Hello,
I am having some problems with messages and keys created/encrypted
using PGP 8.1. I was, for example, sent a public key block exported
from PGP 8.1 and gnupg refused to import that key into my keyring,
giving me the message "gpg: no valid OpenPGP data found". I had to
install PGP 9.0, impor
Hello everyone,
How should I choose an algorithm for my key.
Since ElGamal is able to make signatures and encryption... why do we
have other alternatives?
Does it help to have multiple key??
Sincerely yours
Youssef Aoun
___
Gnupg-users mailing list
Gn
speaking of encrypted file-systems, does anyone know what happened to
rubberhose.org?
--
...atom
_
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
-
Markus Breitländer wrote:
is it possible to use GnuPG for filesystem encryption?
I am thinking about having a directory tree o your hard disk that is
encrypted using GnuPG PKI - only accessible with once secret-key + mantra.
Are there solutions like that for Windows? I read about implementations
On Thu, 26 May 2005, Erpo wrote:
Cryptographic capabilities must be integrated into every popular OS and
application in such a way as to make it automatic and easy to encrypt
everything, no matter how mundane, from IMs to downloaded device
drivers. Once everyone is doing it, the people who rea
[Alex L. Mauer]
> Can you expand on this?
>
> How could the Name/address/ssn be retrieved from a hash of the same?
>
The data can be recovered from the hash because search space is small.
Say you are looking for the SSN of a John Smith. Every large DB is bound
to have someone named John Smith.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 25 May 2005, Alex L. Mauer wrote:
> Florian Weimer wrote:
> > * Sean C.:
> >>The I.B.M. software would convert data on a person into a string of
> >>seemingly
> >>random characters, using a technique known as a one-way hash function. No
> >>na
Hi Johan,
you may be right. I tried it with ./configure
--enable-ciphers="aes,...,rfc2268" und after that found in Makefile
rfc2268 among the algorithms to be compiled, but after installation
rfc2268 is still missed in output "libgcrypt-config --algorithms"
Johan Wevers wrote:
>> Alexander Hoffm
Hello,
i don't know if it is the best place to ask this type of questions, but
if i'm wrong here could you tell me a right mailing list fot it.
I want to decrypt rrc2 encrypted mails and use libgcrypt for this
purpose. As i know the RC2 algorithm is implemented in libgcrypt
(rfc2268.c), but it wil
On Tue, 2005-05-24 at 21:07 +0930, Roscoe wrote:
> Hmmm, out of curiosity did you intend to send that to the list?
Nope. And although I am sending this one to the list, it is for
PRIVATE distribution and discussion only. I don't think it is of
general interest. Then again, I could be wrong...it
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Sean C. wrote:
>
> I'm confused though.
> I just read this article from the New York Times. As a newbie to encryption
> and
> hash algorithms I thought the idea behind hashes was that you couldn't
> reconstruct the data from the hash.
>
You ca
Hi
I'm new here
Sorry to butt in
>
>For gpg it makes no difference whether the key is on the disk or on
>the card. This is because we create a "stub"- secret key for every
>card key. gpg -K will show you the serial number of the cards
>associated with that secret key.
>
what is a "stub" s
Hello everyone,
How should I choose an algorithm for my key.
Since ElGamal is able to make signatures and encryption... why do we
have other alternatives?
Does it help to have multiple key??
Sincerely yours
Youssef Aoun
___
Gnupg-users mailing list
Gnu
--- Shatadal <[EMAIL PROTECTED]> wrote:
> From
>
http://news.com.com/Minnesota+court+takes+dim+view+of
+encryption/2100-1030_3-5718978.html
>
> "A Minnesota appeals court has ruled that the
> presence of encryption software on a computer may be
> viewed as evidence of criminal intent."
>
Then I
On Wed, 2005-05-25 at 16:11 -0500, Shatadal wrote:
> From
> http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html
>
> "A Minnesota appeals court has ruled that the presence of encryption
> software on a computer may be viewed as evidence of criminal intent."
Th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey,
is it possible to use GnuPG for filesystem encryption?
I am thinking about having a directory tree o your hard disk that is
encrypted using GnuPG PKI - only accessible with once secret-key + mantra.
Are there solutions like that for Windows? I re
20 matches
Mail list logo