[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Paranoid



> Does PGP compress the text before it is encoded?

Yes.  It uses the zip algorithm (I think) as its compression engine.

> Does this allow a cracker to search for the compression's signature
> after every attempt?

Every attempt?  You mean every attempt at encryption?  Well, yes and
no.  Yes, there is a semi-known plaintext inside the encrypted data.
It is unknown if this can help an attacker.

> Is there a checksum that a cracker could use to test for success after
> every attempt?

The only checksums are the ASCII-armor checksums, and the MD5 hash
which is inside the RSA signature.  Other than these, there are no
checksums.  Neither of these can be used to aid an attacker.

> Would using UUENCODE on the text and deleting the "begin/end" lines
> before encrypting it have a synergistic effect on the difficulty of
> cracking a secret key from that particular message?

This would give an attacker even MORE of a plaintext attack, since
this will create lines of 64 characters, starting with an "M", which
gives a regular pattern to the plaintext.

> Is there an easy way to generate keys larger than 1024 bits?

No.  However given current technology and assuming no significant
breakthroughs in factoring algorithms, a 1024 bit key wont be broken
for over a million year (significantly more, if I recall).

Hope this helps.

-derek