Henry Hertz Hobbit wrote:
>
> I will volunteer for being one of the three users (after yourself
> you need only one more user) if you want to do the tests actually
> using email itself, but I would advise just using the multiple
> recipients on the command line first and comparing the sizes there.
Joseph Oreste Bruni <[EMAIL PROTECTED]> wrote:
> To extend our discussion, suppose I wish to send an encrypted message
> to multiple recipients. I would then encrypt the (randomly generated)
> symmetric key to each recipient's public key in turn. All of the
> encrypted copies (of the symmetr
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
> GPG creates a random key from a source of entropy such as
> /dev/random. This key is used in a symmetric cipher such as AES128
> to encrypt my message.
> This symmetric KEY is then ENCRYPTED using your public key and
> attached to the end of t
Correct. If I'm sending a message that I want protected, I hash the
contents with something like SHA-1. I encrypt this hash with my
private key and attach the encrypted hash to the document.
Recipients can then compute their own hash of the document, decrypt
the attached, encrypted hash usi
Gotcha. The public key does not "generate" the key. I'm going to walk
through the process again, so please bear with me.
I'm going to send you a message.
GPG creates a random key from a source of entropy such as /dev/
random. This key is used in a symmetric cipher such as AES128 to
encrypt
On Wed, Jun 20, 2007 at 01:22:44PM -0500, Andrew Berg wrote:
> Joseph Oreste Bruni wrote:
> > By definition of symmetric encryption, you must use the same key to
> > decrypt that was used to encrypt. I'm not sure what you're really
> > asking.
> >
> > When you say "public key is used to generate s
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Joseph Oreste Bruni wrote:
> By definition of symmetric encryption, you must use the same key to
> decrypt that was used to encrypt. I'm not sure what you're really
> asking.
>
> When you say "public key is used to generate symmetric key" you
>
By definition of symmetric encryption, you must use the same key to
decrypt that was used to encrypt. I'm not sure what you're really
asking.
When you say "public key is used to generate symmetric key" you lost
me. Symmetric keys are typically just random numbers pulled from /dev/
random o
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Why can't I use the same (symmetric) key I used to encrypt (public key
is used to generate symmetric key that the corresponding private key
can calculate) to decrypt?
- --
Windows NT 5.1.2600.2180 | Thunderbird 2.0.0.4 | Enigmail 0.95.1 | GPG
1.