Re: If the message is encrypted symmetrically

2007-06-21 Thread John Clizbe
Henry Hertz Hobbit wrote: > > I will volunteer for being one of the three users (after yourself > you need only one more user) if you want to do the tests actually > using email itself, but I would advise just using the multiple > recipients on the command line first and comparing the sizes there.

Re: If the message is encrypted symmetrically

2007-06-21 Thread Henry Hertz Hobbit
Joseph Oreste Bruni <[EMAIL PROTECTED]> wrote: > To extend our discussion, suppose I wish to send an encrypted message > to multiple recipients. I would then encrypt the (randomly generated) > symmetric key to each recipient's public key in turn. All of the > encrypted copies (of the symmetr

Re: If the message is encrypted symmetrically...

2007-06-20 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 > GPG creates a random key from a source of entropy such as > /dev/random. This key is used in a symmetric cipher such as AES128 > to encrypt my message. > This symmetric KEY is then ENCRYPTED using your public key and > attached to the end of t

Re: If the message is encrypted symmetrically...

2007-06-20 Thread Joseph Oreste Bruni
Correct. If I'm sending a message that I want protected, I hash the contents with something like SHA-1. I encrypt this hash with my private key and attach the encrypted hash to the document. Recipients can then compute their own hash of the document, decrypt the attached, encrypted hash usi

Re: If the message is encrypted symmetrically...

2007-06-20 Thread Joseph Oreste Bruni
Gotcha. The public key does not "generate" the key. I'm going to walk through the process again, so please bear with me. I'm going to send you a message. GPG creates a random key from a source of entropy such as /dev/ random. This key is used in a symmetric cipher such as AES128 to encrypt

Re: If the message is encrypted symmetrically...

2007-06-20 Thread David Shaw
On Wed, Jun 20, 2007 at 01:22:44PM -0500, Andrew Berg wrote: > Joseph Oreste Bruni wrote: > > By definition of symmetric encryption, you must use the same key to > > decrypt that was used to encrypt. I'm not sure what you're really > > asking. > > > > When you say "public key is used to generate s

Re: If the message is encrypted symmetrically...

2007-06-20 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Joseph Oreste Bruni wrote: > By definition of symmetric encryption, you must use the same key to > decrypt that was used to encrypt. I'm not sure what you're really > asking. > > When you say "public key is used to generate symmetric key" you >

Re: If the message is encrypted symmetrically...

2007-06-20 Thread Joseph Oreste Bruni
By definition of symmetric encryption, you must use the same key to decrypt that was used to encrypt. I'm not sure what you're really asking. When you say "public key is used to generate symmetric key" you lost me. Symmetric keys are typically just random numbers pulled from /dev/ random o

If the message is encrypted symmetrically...

2007-06-20 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Why can't I use the same (symmetric) key I used to encrypt (public key is used to generate symmetric key that the corresponding private key can calculate) to decrypt? - -- Windows NT 5.1.2600.2180 | Thunderbird 2.0.0.4 | Enigmail 0.95.1 | GPG 1.