Re: questions: no input file, and pascal programming

2009-05-01 Thread John Clizbe
Philip wrote: > Hi > I have some questions about gpg > 1. using gpg command line, can I pass data to be encrypted to gpg that > isn't in a file? For example if I want to encrypt "Mary had a little > lamb" to a an asc file but I don't want to put that text onto the hard > drive unencrypted first.

questions: no input file, and pascal programming

2009-05-01 Thread Philip
Hi I have some questions about gpg 1. using gpg command line, can I pass data to be encrypted to gpg that isn't in a file? For example if I want to encrypt "Mary had a little lamb" to a an asc file but I don't want to put that text onto the hard drive unencrypted first. 2. is there something lik

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Robert J. Hansen escribió: > John W. Moore III wrote: >> Riddle Me this, Robert; _if_ "The Customer" has a requirement that >> 3DES must be used [and they are associating it with their Key] then >> wouldn't this mean that the *only* preference broadc

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Robert J. Hansen escribió: > Smith, Cathy wrote: >> The customer said they have a proprietary implementation that only >> supports Blowfish or 3DES for the key. I'm still trying to find out >> exactly what that means. > > Okay, that much makes sens

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 John W. Moore III escribió: ... > Riddle Me this, Robert; _if_ "The Customer" has a requirement that 3DES > must be used [and they are associating it with their Key] then wouldn't > this mean that the *only* preference broadcast by their Key is 3DES?

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Robert J. Hansen
John W. Moore III wrote: > Riddle Me this, Robert; _if_ "The Customer" has a requirement that > 3DES must be used [and they are associating it with their Key] then > wouldn't this mean that the *only* preference broadcast by their Key > is 3DES? You're assuming the customer's key is correctly adve

Re: Selecting cipher to generate a key pair

2009-05-01 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen wrote: > Smith, Cathy wrote: >> The customer said they have a proprietary implementation that only >> supports Blowfish or 3DES for the key. I'm still trying to find out >> exactly what that means. > > Okay, that much makes sense n

RE: Selecting cipher to generate a key pair

2009-05-01 Thread Smith, Cathy
Thanks. I'll try that. Cathy --- Cathy L. Smith Engineer Pacific Northwest National Laboratory Operated by Battelle for the U.S. Department of Energy Phone: 509.375.2687 Fax: 509.375.2330 Email: cathy.sm...@pnl.gov -Original Message- From: Robert J. Hansen [mailto:r...@

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Robert J. Hansen
Smith, Cathy wrote: > The customer said they have a proprietary implementation that only > supports Blowfish or 3DES for the key. I'm still trying to find out > exactly what that means. Okay, that much makes sense now. I would suggest adding: cipher-algo 3DES ... to your .gnupg/gpg.conf file.

RE: Selecting cipher to generate a key pair

2009-05-01 Thread Smith, Cathy
I agree that with the lack of understanding. It's been difficult to get specific information from the customer. I don't have the option of saying it's their problem. The GnuPG was a guess after I read something about specifying the cipher algorithm. The customer said they have a proprietary i

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Robert J. Hansen
Smith, Cathy wrote: > The customer stated that he can accept a public key generated with > either Blowfish or Triple-DES. I wasn't sure what he needed because all > I've dealt with in generating a key pair before is selecting the DSA or > RSA option. Our PGP version doesn't offer the DSA and Elga

RE: Selecting cipher to generate a key pair

2009-05-01 Thread Smith, Cathy
The customer stated that he can accept a public key generated with either Blowfish or Triple-DES. I wasn't sure what he needed because all I've dealt with in generating a key pair before is selecting the DSA or RSA option. Our PGP version doesn't offer the DSA and Elgamal option. I've sent him

Re: Selecting cipher to generate a key pair

2009-05-01 Thread Robert J. Hansen
Smith, Cathy wrote: > Is there a brief explanation available as to how the cipher is used in > generating the private/public keys? It seems this is separate from the > cipher that is chosen to encrypt my data. r...@chronicles:~$ gpg --enable-dsa2 --gen-key Please select what kind of key you want

RE: Selecting cipher to generate a key pair

2009-05-01 Thread Smith, Cathy
Is there a brief explanation available as to how the cipher is used in generating the private/public keys? It seems this is separate from the cipher that is chosen to encrypt my data. Thanks. Cathy --- Cathy L. Smith Engineer Pacific Northwest National Laboratory Operated by Battelle for th

RE: Selecting cipher to generate a key pair

2009-05-01 Thread vedaal
"Smith, Cathy" wrote on Date: 2009-05-01 16:08:44 : >I have a customer who can not accept our pgp public key. >They are asking for a specific cipher to be used in generating the public key. this sounds like there might be a 'problem' ... there are people who 'can' use 'any' cipher, but pref

RE: Selecting cipher to generate a key pair

2009-05-01 Thread Smith, Cathy
My apologies to the group. I meant to say gpg --gen-key I have a customer who can not accept our pgp public key. They are asking for a specific cipher to be used in generating the public key. After some reading yesterday, it seemed that gpg might be the solution. I don't have any

Re: New results against SHA-1

2009-05-01 Thread Atom Smasher
On Thu, 30 Apr 2009, David Shaw wrote: http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf There is not much hard information yet, but the two big quotes are "SHA-1 collisions now 2^52" and "Practical collisions are within resources of a well funded organisation."