Possible bug in gpg?

Johan Wevers johanw at vulcan.xs4all.nl
Sun Jul 29 15:29:45 CEST 2012


On 29-07-2012 6:48, David Shaw wrote:

> To combat this, OpenPGP has two "quick check" bytes in the encrypted data packet.
> Basically, they're a repetition of two random bytes from earlier in
the message.

Does this not lead to a possible known-plaintext attack on gpg?

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html




More information about the Gnupg-users mailing list