Re: Problem compiling gnupg on Ubuntu 14-04

2015-06-03 Thread Daniel Kahn Gillmor
On Wed 2015-06-03 11:41:37 -0400, Sven Larsson wrote: > It's a problem which has come up before, but I can't find a search > engine for the archives, so I'll have to ask again. > > When making gnupg-2.0.28 I get the following error message: > > ../../g10/gpg2: error while loading shared libraries:

Problem compiling gnupg on Ubuntu 14-04

2015-06-03 Thread Sven Larsson
It's a problem which has come up before, but I can't find a search engine for the archives, so I'll have to ask again. When making gnupg-2.0.28 I get the following error message: ../../g10/gpg2: error while loading shared libraries: libgcrypt.so.20: cannot open shared object file: No such file or

Libksba Release notes

2015-06-03 Thread Gordon, Michael
I am trying to understand the new functionality added to release GnuPG 1.0.5 for Windows. The release noted states "This is a binary release for Windows". What does this statement mean? Thanks. Michael Gordon ___ Gnupg-users mailing list Gnupg-user

Re: s2k-cipher-mode default

2015-06-03 Thread Robert J. Hansen
> And now consider the 10**50 messages djb assumes. Time for me to put out a big "I screwed up" message. I screwed up: my math is, in fact, wrong. I was in a boring meeting today and was mentally reviewing my math and realized, "wait, there's no way a 2**-78 chance of picking a weak key by accid

Re: s2k-cipher-mode default

2015-06-03 Thread Werner Koch
On Wed, 3 Jun 2015 14:58, r...@sixdemonbag.org said: > No, I'm not kidding. Do the math yourself. Right. I's also suggest that everyone doing this math should also look up examples of large numbers. Applied Cryptography prints a list right after the introduction (page 18 in my edition) for a

Re: s2k-cipher-mode default

2015-06-03 Thread Daniel Kahn Gillmor
On Tue 2015-06-02 18:15:21 -0400, NdK wrote: > IIRC, I read (some years ago...) that AES-256 could be *weaker* than > AES-128 because some mathematical structures express some properties > only with the longer keys. I don't have the paper handy ATM, but I > vaguely remember that shocking conclusio

Re: s2k-cipher-mode default

2015-06-03 Thread Robert J. Hansen
>> 1. A very large number of intercepted OpenPGP messages We don't >> have #1 > > We're Post-Snowden, right? Not 10**50 messages worth, we're not. > "Show me all PGP usage in Iran" Maybe 10**9. *Maybe*. Multiply that by a factor of 100,000,000,000,000,000,000,000,000,000,000,000,000,000 and

Re: s2k-cipher-mode default

2015-06-03 Thread ilf
I agree with dkg. Robert J. Hansen: I think this is a pretty unrealistic thought experiment. It requires two conditions to be met: 1. A very large number of intercepted OpenPGP messages We don't have #1 We're Post-Snowden, right? "Show me all PGP usage in Iran" "Can perform this ki