howto secure older keys after the recent attacks
    reynt0 
    reynt0 at cs.albany.edu
       
    Fri Sep 11 02:36:39 CEST 2009
    
    
  
On Fri, 2009-09-11 Christoph Anton Mitterer wrote:
  . . .
> sell bad devices that produce poor entropy thus rendering
> our (symmetric and asymmetric) keys, signatures etc. "useless".
  . . .
Just out of curiousity, about how "poor" entropy might make 
it easy to break encryption:  Is it necessary for an attacker 
to know pre-attack that a specific targeted file has been
encrypted or etc using poor entropy?  Or is the weakness one
which can efficiently be exploited en mass, by attacking all
files in a batch of files and just being successful against
any of the files which happened to be encrypted using poor
entropy?
    
    
More information about the Gnupg-users
mailing list